1. [1] Cyren, “2015 Cyber Threats Yearbook,” http://pages.cyren.com/SecurityYearbook_2015.html, accessed July 1, 2015.
2. [2] Mozilla, https://support.mozilla.org/en-US/kb/how-does-phishing-and-malware-protection-work, accessed July 1, 2015.
3. [3] Netcraft, http://toolbar.netcraft.com/, accessed July 1, 2015.
4. [4] W.W. Zhuang, and Q.S. Jiang, “Intelligent anti-phishing framework using multiple classifiers combination,” Journal of Computational Information Systems, vol.8, no.17, pp.7267-7281, March 2012.
5. [5] J. Ma, L.K. Saul, S. Savage, and G.M. Voelker, “Beyond blacklists: Learning to detect malicious web sites from suspicious URLs,” Proc. 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.1245-1254, Paris, France, June 2009.