Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection
Crossref DOI link: https://doi.org/10.1007/s12083-020-00944-z
Published Online: 2020-06-20
Published Print: 2021-07
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Nirmal, K.
Janet, B.
Kumar, R.
Text and Data Mining valid from 2020-06-20
Version of Record valid from 2020-06-20
Article History
Received: 18 April 2020
Accepted: 8 June 2020
First Online: 20 June 2020