How Using the SLAM Method Can Improve Phishing Detection