-
1by Liew, Seow Wooi“..., ranging from blacklists, heuristics and visual similarity to machine learning are used to detect phishing...”
Published 2019
Get full text
Thesis -
2by Ghasempour, Ali“... statistical methods have been used to optimal distinguish malicious and benign applications. Machine learning...”
Published 2019
Get full text
Thesis -
3by Sarvari, Samira“... of the system. In recent years, detection methods based on machine learning techniques are widely deployed...”
Published 2020
Get full text
Thesis