[1]
R. S. . jenni and S. . Shankar, “Review of Various Methods for Phishing Detection”, EAI Endorsed Trans Energy Web, vol. 5, no. 20, p. e16, Sep. 2018, doi: 10.4108/eai.12-9-2018.155746.