1. Alyias D., Henry P., Rains T., Batchelder D., Jones J., Sekhar V.. An in-depth perspective on software vulnerabilities and exploits, malware, potentially unwanted software, and malicious websites report. 2012.
2. Can we can the email spam;Bajaj,2013
3. Infiltrating waledac botnet’s covert operations;Baltazar,2009
4. Baraniuk C.. Spike in brexit email spam following referendum result. 2016.
5. Classifying phishing emails using confidence-weighted linear classifiers;Basnet,2010