1. Stavroulakis, P., Stamp, M. (eds.) Handbook of Information and Communication Security. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-04117-4
2. Jakobsson, M., Myers, S.: Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. Wiley, Hoboken (2006)
3. Rader, M.A., Rahman, S.M.: Phishing techniques and mitigating the associated security risks. Int. J. Netw. Secur. Appl. 5, 23–41 (2013)
4. Symantec. ISTR Internet Security Threat Report 2019. Symantec 2019, 24, 61. https://docs.broadcom.com/doc/istr-15-april-volume-20-en. Accessed 15 Dec 2019
5. Sreenivasulu, N.: 31 Cyber Attacks Statistics and Trends for 2022 (2022). https://www.vpnhelpers.com/cyber-attack-statistics/. Accessed 12 June 2022