S. Afroz and R. Greenstadt. Phishzoo: An automated web phishing detection approach based on profiling and fuzzy matching. Technical report, Technical Report DU-CS-09-03, Drexel University, 2009.
 A. A. D. Al-Momani, T.-C. Wan, K. Al-Saedi, A. Altaher, S. Ramadass, A. Manasrah, L. B. Melhiml, and M. Anbar. An online model on evolving phishing e-mail detection and classification method. Journal of Applied Sciences, 11(18), 2011.
 D. S. Anderson, C. Fleizach, S. Savage, and G. M. Voelker. Spamscatter: Characterizing internet scam hosting infrastructure. PhD thesis, University of California, San Diego, 2007.
 APWG. Global phishing survey: Trends and domain name use in 2H2010. Technical report, http://docs.apwg.org/reports/APWG GlobalPhishingSurvey 2H2010.pdf, 2010.
 APWG. Global phishing survey: Trends and domain name use in 2H2013. Technical report, http://docs.apwg.org/reports/APWG GlobalPhishingSurvey 2H2013.pdf, 2013.
 A. Bergholz, J. H. Chang, G. Paaß, F. Reichartz, and S. Strobel. Improved phishing detection using model-based features. In CEAS, 2008.
 A. Blum, B. Wardman, T. Solorio, and G. Warner. Lexical feature based phishing url detection using online learning. In Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security, pages 54-60. ACM, 2010.
 M. Casado, T. Garfinkel, W. Cui, V. Paxson, and S. Savage. Opportunistic measurement: Extracting insight from spurious traffic. In Proc. 4th ACM Workshop on Hot Topics in Networks (Hotnets-IV), 2005.
 S. Chhabra, A. Aggarwal, F. Benevenuto, and P. Kumaraguru. Phi. sh/$ ocial: the phishing landscape through short urls. In Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, pages 92-101. ACM, 2011.
 N. Chou, R. Ledesma, Y. Teraguchi, and J. C. Mitchell. Client-side defense against web-based identity theft. In NDSS, 2004.
 R. Dhamija and J. D. Tygar. The battle against phishing: Dynamic security skins. In Proceedings of the 2005 symposium on Usable privacy and security, pages 77-88. ACM, 2005. [OpenAIRE]
 R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In Proceedings of the SIGCHI conference on Human Factors in computing systems, pages 581-590. ACM, 2006. [OpenAIRE]
 J. S. Downs, M. B. Holbrook, and L. F. Cranor. Decision strategies and susceptibility to phishing. In Proceedings of the second symposium on Usable privacy and security, pages 79-90. ACM, 2006.
 S. Egelman, L. F. Cranor, and J. Hong. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 1065-1074. ACM, 2008. [OpenAIRE]
 I. Fette, N. Sadeh, and A. Tomasic. Learning to detect phishing emails. In Proceedings of the 16th international conference on World Wide Web, pages 649-656. ACM, 2007. [OpenAIRE]