1. Vayansky, I., Kumar, S.L.: Phishing–challenges and solutions. Computer Fraud & Security (1), 15-20 (2018).
2. Gupta, B. B., Tewari, A., Jain, A. K., Agrawal, D. P.: Fighting against phishing attacks: state of the art and future challenges. Neural Computing and Applications 28(12), 3629-3654 (2017).
3. Gupta, B. B., Arachchilage, N. A., Psannis, K. E.: Defending against phishing attacks: taxonomy of methods, current issues and future directions. Telecommunication Systems 67(2), 247-267 (2018).
4. Chin, K. O., Chang, K. T., Teo, J., Alfred, R., Cheng, W., Tan, T. G.: Self-Evaluation of RTS Troop’s Performance. Journal Teknologi. UTM Press. 76(12), 119–126 (2015).
5. Tan, T. G., Yong, Y. N., Chin, K. O., Teo, J., Alfred, R.: Automated Evaluation for AI Controllers in Tower Defense Game Using Genetic Algorithm. CCIS 378, Springer-Verlag Berlin Heidelberg, 135–146 (2013).