[1]
Y. Li, K. Xiong, and X. . Li, “Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur”,
EAI Endorsed Trans Sec Saf
, vol. 6, no. 21, p. e3, Aug. 2019.