1. Analysis of Threats Motivating DomainKeys Identified Mail (DKIM) (RFC 4686), https://tools.ietf.org/html/rfc4686#section-4.1.4 (2014). Accessed 17 Apr 2016
2. Bag-of-Words Model, https://en.wikipedia.org/wiki/Bag-of-words_model . Accessed 17 Apr 2016
3. H. Ballani, P. Francis, X. Zhang, A study of prefix hijacking and interception in the internet. ACM SIGCOMM Comput. Commun. Rev. 37, 265–276 (2007)
4. A. Bergholz, G. Paass, F. Reichartz, S. Strobel, M.-F. Moens, B. Witten, Detecting known and new salting tricks in unwanted emails, in CEAS (2008)
5. A. Bergholz, J. De Beer, S. Glahn, M.-F. Moens, G. Paaß, S. Strobel, New filtering approaches for phishing email. J. Comput. Secur. 18 (1), 7–35 (2010)