[1]
Z. R. Shi, “Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK”, AAAI, vol. 34, no. 08, pp. 13363-13368, Apr. 2020.