1. Why phishing still works: user strategies for combating phishing attacks;Alsharnouby;International Journal of Human-Computer Studies,2015
2. APWG, Phishing Activity Trends Report, 2nd Quarter 2014, 2014, retrieved from http://docs.apwg.org/reports/apwg_trends_report_q2_2014.pdf. Accessed 26.03.16.
3. APWG, Global Phishing Survey: Trends and Domain Name Usein 2H2014, 2015, retrieved from http://docs.apwg.org/reports/APWG_Global_Phishing_Report_2H_2014.pdf. Accessed 26.03.16.
4. Assessing the accuracy of prediction algorithms for classification: an overview;Baldi;Bioinformatics,2000
5. Unveiling the mask of phishing: threats, preventive measures, and responsibilities;Bose;Communications ofthe Association for Information Systems,2007