1.
Shi ZR, Schlenker A, Hay B, Bittleston D, Gao S, Peterson E, Trezza J, Fang F. Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK. AAAI [Internet]. 2020Apr.3 [cited 2024Apr.24];34(08):13363-8. Available from: https://ojs.aaai.org/index.php/AAAI/article/view/7050