[HTML][HTML] Applications of deep learning for phishing detection: a systematic literature review

C Catal, G Giray, B Tekinerdogan, S Kumar… - … and Information Systems, 2022 - Springer
Phishing attacks aim to steal confidential information using sophisticated methods,
techniques, and tools such as phishing through content injection, social engineering, online …

Applications of deep learning for phishing detection: a systematic literature review

C Catal, G Giray, B Tekinerdogan, S Kumar, S Shukla - 2022 - qspace.qu.edu.qa
Phishing attacks aim to steal confidential information using sophisticated methods,
techniques, and tools such as phishing through content injection, social engineering, online …

[HTML][HTML] Applications of deep learning for phishing detection: a systematic literature review

C Catal, G Giray, B Tekinerdogan… - Knowledge and …, 2022 - ncbi.nlm.nih.gov
Phishing attacks aim to steal confidential information using sophisticated methods,
techniques, and tools such as phishing through content injection, social engineering, online …

Applications of deep learning for phishing detection: a systematic literature review

C Catal, G Giray, B Tekinerdogan, S Kumar… - Knowledge and …, 2022 - research.wur.nl
Phishing attacks aim to steal confidential information using sophisticated methods,
techniques, and tools such as phishing through content injection, social engineering, online …

Applications of deep learning for phishing detection: a systematic literature review.

C Catal, G Giray, B Tekinerdogan, S Kumar… - Knowledge and …, 2022 - europepmc.org
Phishing attacks aim to steal confidential information using sophisticated methods,
techniques, and tools such as phishing through content injection, social engineering, online …

[PDF][PDF] Applications of deep learning for phishing detection: a systematic literature review

C Catal, G Giray, B Tekinerdogan, S Kumar, S Shukla - academia.edu
Phishing attacks aim to steal confidential information using sophisticated methods,
techniques, and tools such as phishing through content injection, social engineering, online …

Applications of deep learning for phishing detection: a systematic literature review

C Catal, G Giray, B Tekinerdogan… - Knowledge and …, 2022 - pubmed.ncbi.nlm.nih.gov
Phishing attacks aim to steal confidential information using sophisticated methods,
techniques, and tools such as phishing through content injection, social engineering, online …

Applications of deep learning for phishing detection: a systematic literature review

C Catal, G Giray, B Tekinerdogan… - Knowledge and …, 2022 - search.proquest.com
Phishing attacks aim to steal confidential information using sophisticated methods,
techniques, and tools such as phishing through content injection, social engineering, online …

Applications of deep learning for phishing detection: a systematic literature review

C Catal, G Giray, B Tekinerdogan, S Kumar… - Knowledge and …, 2022 - library.wur.nl
Phishing attacks aim to steal confidential information using sophisticated methods,
techniques, and tools such as phishing through content injection, social engineering, online …

Applications of deep learning for phishing detection: a systematic literature review

C Catal, G Giray, B Tekinerdogan, S Kumar… - … and Information Systems, 2022 - dl.acm.org
Phishing attacks aim to steal confidential information using sophisticated methods,
techniques, and tools such as phishing through content injection, social engineering, online …