Browsing by Author "4fd77c2a-5734-4234-bd91-0a8c94a55a61"
Now showing items 1-1 of 1
-
Exploring Phishing Detection Using Search Engine Optimization and Uniform Resource Locator based Information
Ma, Kewei (2021-04-29)Phishing attacks are the work of social engineering. They are used to trick users to obtain their sensitive/private information using malicious links, websites, and electronic messages. In this thesis, phishing attack ...