Cited By
View all- Charmet FMorikawa TTanaka ATakahashi T(2024)VORTEX : Visual phishing detectiOns aRe Through EXplanationsACM Transactions on Internet Technology10.1145/365466524:2(1-24)Online publication date: 6-May-2024
- Lim KPark JKim DChua TNgo CKa-Wei Lee RKumar RLauw H(2024)Phishing Vs. Legit: Comparative Analysis of Client-Side Resources of Phishing and Target Brand WebsitesProceedings of the ACM Web Conference 202410.1145/3589334.3645535(1756-1767)Online publication date: 13-May-2024
- R RKumar A(2024)Reversible key frame selection data hiding in videos using search tree labelling schemeMultimedia Tools and Applications10.1007/s11042-023-15671-983:2(3855-3878)Online publication date: 1-Jan-2024
- Show More Cited By