[1]
“An In-Depth Review of ML and DL Approaches for Phishing Email Identification and Mitigation”, JGRMS, vol. 1, no. 5, pp. 8–16, Jun. 2025, doi: 10.5281/10.5281/zenodo.15662966.