Cited By
View all- Keerthana NSuresh PKulandaivel MKulandaivel S(2025)Critical Strategies for Phishing Defense and Digital Asset ProtectionCritical Phishing Defense Strategies and Digital Asset Protection10.4018/979-8-3693-8784-9.ch011(221-244)Online publication date: 28-Feb-2025
- K. S. JArthi B(2024)Phishing URL Detection Using BiLSTM With Attention MechanismMachine Intelligence Applications in Cyber-Risk Management10.4018/979-8-3693-7540-2.ch008(159-184)Online publication date: 22-Nov-2024
- Aslam SAslam HManzoor AChen HRasool A(2024)AntiPhishStack: LSTM-Based Stacked Generalization Model for Optimized Phishing URL DetectionSymmetry10.3390/sym1602024816:2(248)Online publication date: 17-Feb-2024
- Show More Cited By