1. G. Eason, B. Noble, I.N. Sneddon, On certain integrals of Lipschitz-Hankel type involving products of bessel functions. Philosophical Trans. R. Soc. London A247, 529–551 (1955)
2. A.N. Shaikh, et al., A literature review on phishing crime, prevention review and investigation of gaps, in 2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA), pp. 9–15 (2016)
3. Phishtank, Phishtank (2005) [Online]. Available https://www.phishtank.com/
4. X. Han, N. Kheir, D. Balzarotti, Phisheye: live monitoring of sandboxed phishing kits, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016)
5. D.Y. Weider, S. Nargundkar, N. Tiruthani, A phishing vulnerability analysis of web based systems, in 2008 IEEE Symposium on Computers and Communications (IEEE, 2008)