1. Aas, J.: The CA’S role in fighting phishing and malware. https://letsencrypt.org/2015/10/29/phishing-and-malware.html . Accessed 29 Apr 2019
2. Asuncion, A., Newman, D.: UCI machine learning repository (2007)
3. Ca/browser forum baseline requirements documents. https://cabforum.org/baseline-requirements-documents/ . Accessed 13 Apr 2019
4. Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Int. Res. 16(1), 321–357 (2002). http://dl.acm.org/citation.cfm?id=1622407.1622416
5. Homoglyph advanced phishing attacks. https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/200146-Homoglyph-Advanced-Phishing-Attacks.pdf . Accessed 13 Apr 2019