[1]
R. S. . jenni and S. . Shankar, “Review of Various Methods for Phishing Detection”, EAI Endorsed Trans Energy Web, vol. 5, no. 20, p. e16, Sep. 2018.