2 works on record
A Machine-Learning Approach to Phishing Detection and Defense
Comparative Study of Multiple Black Hole Attacks Solution Methods in MANET Using AODV Routing Protocol