1. Acquire. (2014). Embrace Social Content with Confidence. Retrieved from: http://www.acquia.com/sites/default/files/library/attachment/mollom-data-sheet.pdf
2. Ahmad, A., & Yan, J. (2010). Color, Usability, and Security: A Case Study. Retrieved from: http://www.computer.org/csdl/mags/ic/2012/02/mic2012020044-abs.html
3. Ahn, L., Blum, M., Hopper, N., & Longford, J. (2013). CAPTCHA: Using Hard AI problems for Security. The 22 International Conference on Theory and Applications on Cryptographic, 249-311.
4. Alexa. (2015). Actionable Analytics for the Web. Retrieved from: http://www.alexa.com/
5. Azad, S., & Jain, K. (2013). CAPTCHA: Attacks and Weaknesses against OCR Technology. Global Journal of Computer Science and Technology Neural & Artificial Intelligence, 13(3).