1. Apwg phishing activity trends (February 2011),
http://www.antiphishing.org/reports
2. http://www.docs.sun.com/source/819-0063/im-architecture.html
3. Atighetchi, M., Pal, P.: Attribute-based Prevention of Phishing Attacks Copyright 2009, BBN Technologies (2009)
4. Soghoian, C.: Legal Risks For Phishing Researchers. IEEE Explorer (2009)
5. Chen, K.-T., Huang, C.-R., Chen, C.-S.: Fighting phishing with discriminative key point features. IEEE Internet Community (2010)