1. Same origin policy,
http://www.w3.org/Security/wiki/Same_Origin_Policy
2. Bai, X., Cambazoglu, B.B., Junqueira, F.P.: Discovering urls through user feedback. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management, CIKM 2011, pp. 77–86. ACM, New York (2011),
http://doi.acm.org/10.1145/2063576.2063592
3. Lecture Notes in Computer Science;A. Doupé,2010
4. Lecture Notes in Computer Science;M. Álvarez,2006
5. Medvet, E., Kirda, E., Kruegel, C.: Visual-similarity-based phishing detection. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm 2008, pp. 22:1–22:6. ACM, New York (2008),
http://doi.acm.org/10.1145/1460877.1460905