1. Sanou B (2016) ICT: facts and Figures. http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2016.pdf
2. Ollmann G (2008) The Evolution of commercial malware development kits and colour-by-numbers custom malware. Comput Fraud Secur 2008(9):4–7
3. Kaspersky (2014) Cybercrime, Inc.: how profitable is the business? URL: https://blog.kaspersky.com/cybercrime-inc-how-profitable-is-the-business/15034/
4. Choi H, Zhu BB, Lee F (2012) Detecting malicious web links and identifying their attack types. In: 2nd proceedings of USENIX conference on Web application development. Berkeley: USENIX Association, CA, USA, pp 11–11
5. Canali D, Cova M, Prophiler GV (2011) A fast filter for the large-scale detection of malicious web pages. In: 20th proceedings of the international conference on World Wide Web. ACM, New York, USA, pp 197–206