1. Alexander, M. (2016). Methods for Understanding and Reducing Social Engineering Attacks. Retrieved from https://www.sans.org/reading-room/whitepapers/critical/paper/36972
2. Measuring the cost of cybercrime.;R.Anderson;Proceedings of Workshop on Economics of Information Security (WEIS 2012),2012
3. APWG (Anti-phishing Working Group). (2018). Phishing Activity Trends Report, 2nd Quarter 2018. Retrieved from https://www.apwg.org/resources/apwg-reports/
4. A comprehensive study of phishing attacks.;M. Z.Banu;International Journal of Computer Science and Information Technologies,2013
5. On the anatomy of social engineering attacks-A literature-based dissection of successful attacks