1. Modelling and simulating access control in wireless ad-hoc networks;Azeez;Fountain J. Natl. Appl. Sci.,2016
2. On the effectiveness of techniques to detect phishing sites;Ludl,2007
3. A review of various techniques for detection and prevention for phishing attack;Suryavanshi;Int. J. Adv. Comput. Technol. (IJACT),2015
4. Intelligent web-phishing detection and protection scheme using integrated features of Images, frames and text;Adebowale;Expert Syst. Appl.,2019
5. Phishing Detection: A Literature Survey;Khonji;IEEE Commun. Surv. Tutor.,2013