1. A lustrum of malware network communication: Evolution and insights;Lever,2017
2. Detecting algorithmically generated malicious domain names;Yadav,2010
3. Learning to detect phishing emails;Fette,2007
4. Know your phish: Novel techniques for detecting phishing sites and their targets;Marchal,2016
5. Hiding in plain sight: A longitudinal study of combosquatting abuse;Kintis,2017