Sciweavers

441 search results - page 89 / 89
» Using structured text for large-scale attribute extraction
Sort
View
JCS
2010
135views more  JCS 2010»
13 years 4 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...