1. The state of phishing attacks;Hong;Communications of the ACM,2012
2. Liang B. , Huang J. , Liu F. , Wang D. , Dong D. and Liang Z. , Malicious web pages detection based on abnormal visibility recognition, E-Business and Information System Security, 2009. EBISS’09, International Conference on IEEE (2009).
3. Garera S. , Provos N. , Chew M. and Rubin A.D. , A framework for detection and measurement of phishing attacks, in Proceedings of the 2007 ACM workshop on Recurring malcode. ACM, (2007), pp. 1–8.
4. Chhabra S. , Aggarwal A. , Benevenuto F. and Kumaraguru P. , Shocial: The phishing landscape through short URL’s, in Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, ACM, (2011), pp. 92–101.
5. Alshboul Y. , Nepali R. and Wang Y. , Detecting malicious short URL’s on twitter, (2015).