Fighting Phishing with Discriminative Keypoint Features.Published in:IEEE Internet Computing, 2009, v. 13, n. 3, p. 56, doi. 10.1109/MIC.2009.59By:Kuan-Ta Chen;Chun-Rong Huang;Chu-Song Chen;Jau-Yuan ChenPublication type:Article