1. Abu-Nimeh, S., Nappa, D., Wang, X., & Nair, S. (2007). A comparison of machine learning techniques for phishing detection. In Proceedings of the eCrime Researchers Summit, 2007.
2. Adida, B., Hohenberger, S., & Rivest, R. (2005). Lightweight encryption for email. USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI), 2005.
3. Anti-Phishing Working Group. (2006). Phishing activity trends report, June 2006. Retrieved from http://antiphishing.org/reports/apwg report june 2006.pdf
4. Anti-Phishing Working Group. (n.d.). Phishing archive. Retrieved from http://www.antiphishing.org/phishing archive.html
5. Bergholz, J.-H., Chang, G. H., Paaß, G., Reichartz, F., & Strobel, S. (2008). Improved phishing detection using model-based features. In Proceedings of the Conference on Email and Anti-Spam (CEAS), 2008.