1. A contextual anomaly detection approach to discover zero-day attacks;AlEroud,2012
2. Computer security incident handling guide;Cichonski,2012
3. Why phishing works;Dahamija,2006
4. Detection of intrusions and malware, and vulnerability assessment;Hutchison,2005
5. Social phishing;Jagatic;Commun ACM,2007