1. A survey of emerging threats in cybersecurity;Jang-Jaccard;J. Comput. Syst. Sci.,2014
2. Hybrid rule-based model for phishing URLs detection;Adewole,2019
3. Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study;Adeyemo;Int. J. Adv. Comput. Sci. Appl.,2019
4. Phishing attack detection based on random forest with wrapper feature selection method;Abdulrahaman;Int. J. Infor. Proc. Commun. (IJIPC),2019
5. Preventive techniques of phishing attacks in networks;Adil,2020