Skip to main content
. 2020 Oct 23;76(1):139–154. doi: 10.1007/s11235-020-00733-2

Fig. 4.

Fig. 4

Taxonomy of this survey focusing on phishing attack detection studies