1. Lokuketagoda, B., Weerakoon, M.P., Kuruppu, U.M., Senarathne, A.N., Abeywardena, K.Y.: R-Killer: an email based ransomware protection tool. In: The 13th International Conference on Computer Science & Education (ICCSE 2018), pp. 735–741. IEEE (2018)
2. Gendre, A.: Ransomware Attacks: Why Email Is Still the #1 Delivery Method. www.vadesecure.com. Available at: https://www.vadesecure.com/en/blog/ransomware-attacks-why-email-is-still-the-1-delivery-method (n.d.). Accessed 9 Mar 2021
3. Jin, X., Osborn, S.L.: Architecture for Data Collection in Database Intrusion Detection Systems. Lecture Notes in Computer Science, pp. 96–107 (n.d.)
4. Wu, C.-H.: Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks. Expert Syst. Appl. 36(3), 4321–4330 (2009)
5. Shad, J., Sharma, S.: A novel machine learning approach to detect phishing websites Jaypee Institute of Information Technology. In: 5th International Conference on Signal Processing and Integrated Networks (SPIN), 2019, pp. 425–430, 2018