1. N. Banu and M. Banu. 2013. A comprehensive study of phishing attacks. (2013). N. Banu and M. Banu. 2013. A comprehensive study of phishing attacks. (2013).
2. S. Bell K. Paterson and L. Cavallaro. 2019. Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists. arXiv:1912.02520 (2019). S. Bell K. Paterson and L. Cavallaro. 2019. Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists. arXiv:1912.02520 (2019).
3. H. Bijmans , T. Booij , A. Schwedersky , A. Nedgabat , and R. van Wegberg . 2021 . Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape through Phishing Kit Detection . In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, 3757–3774. H. Bijmans, T. Booij, A. Schwedersky, A. Nedgabat, and R. van Wegberg. 2021. Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape through Phishing Kit Detection. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 3757–3774.
4. I. Biju C. Raymond and M.J. Seibu. 2014. Analysis of Phishing Attacks and Countermeasures. arXiv:1410.467 (2014). I. Biju C. Raymond and M.J. Seibu. 2014. Analysis of Phishing Attacks and Countermeasures. arXiv:1410.467 (2014).
5. M.C. Birlea . 2020 . Phishing Attacks: Detection And Prevention. arXiv:2004.01556 (2020). M.C. Birlea. 2020. Phishing Attacks: Detection And Prevention. arXiv:2004.01556 (2020).