[1]
Y. Li, K. Xiong, and X. . Li, “Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur”, EAI Endorsed Trans Sec Saf, vol. 6, no. 21, p. e3, Aug. 2019, doi: 10.4108/eai.13-7-2018.162809.