S. S. Silva, R. M. Silva, and R. C. Pinto, “Botnets: A survey,” Computer Networks, vol. 57, no. 2, pp.
-403, 2013.
A. Cole, M. Michael, and D. Noyes, “Botnets: The rise of the machines,” In Proceedings on the 6th Annual Security Conference, 2007.
M. Khonji, Y. Iraqi, and A. Jones, “Phishing Detection: A Literature Survey,” IEEE Communications Surveys & Tutorials, vol. 15, 2013.
H. Rouhani, “Detection of Phishing Websites Using Fast Flux Service Networks (Master's thesis),” Sharif University of Technology, 2010.
PhishTank [Internet]. PhishTank; [cited 2016 May 27]. Available from: http://www.phishtank.com.
A. Ramachandran, “Fishing for Phishing from the Network Stream,” Georgia Tech. CSS Technical Report GT-CS-08-08, 2008.
D. Ken, “Mobile Malware Attacks and Defense,” Syngress Publishing, 2009.
Gartner [Internet]. Gartner: [cited 2016 May 27]. Available from: http://www.gartner.com.
Symantec, “Internet Security Threat Report,” Symantec, 2014
M. Aburrous, “Predicting Phishing Websites using Classification Mining Techniques with Experimental Case Studies,” In Proceedings on the 7th International Conference on Information Technology, IEEE, 2010.
P. Prakash, “Phishnet: predictive blacklisting to detect phishing attacks,” In Proceedings of the 29th conference on Information communications, pp. 346–350, 2010.
N. Chou, “Client-side defense against web-based identity theft,” The Internet Society conference [NDSS], 2004.
C. V. Zhou, “A self-healing self-protecting collaborative intrusion detection architecture to traceback fast-flux phishing domains,” NOMS Workshops, IEEE, 2008.
P. Likarish, D. Dunbar, and T. E. Hansen, “B-apt: Bayesian anti-phishing toolbar,” IEEE International Conference on Communications, 2008.
Y. Zhang, J. I. Hong, and L. F. Cranor, “Cantina: a content-based approach to detecting phishing web sites,” Proceedings of the 16th international conference on World Wide Web, New York, USA, pp. 639–648, 2007.
M. Sharifi and S. H. Siadati, “A Phishing Sites Blacklist Generator,” IEEE, 2008.
P. Singh and M. D. Patil, “Identification of Phishing Web Pages and Target Detection,” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 3, 2014.
L. A. T. Nguyen, “A Novel Approach for Phishing Detection Using URL-Based Heuristic,” IEEE, 2014.
R. Panda and R. Tiwari, “Protection from Phishing Attacks by Exploiting Page Rank,Reputation and Source Code of the Webpage,” India : International Journal of Advanced Research in Computer Science and Software Engineering, 2014.
M. Hara, A. Yamada, and Y. Miyake, “Visual similarity-based phishing detection without victim site information,” IEEE Symposium on Computational Intelligence in Cyber Security, pp. 30-36, 2009.
K. Chen, “Fighting phishing with discriminative keypoint features,” Internet Computing, IEEE, vol. 13, pp. 56-63, 2009.
H. Zhang, “Textual and visual contentbased anti-phishing: A bayesian approach,” IEEE Transactions on Neural Networks, vol. 22, pp. 1532 –1542, 2011.
C. Whittaker, B. Ryner, and M. Nazif, “Large-scale automatic classification of phishing pages,” NDSS, vol. 10, 2010.
P. Likarish, D. Dunbar, and T. E. Hansen, “B-apt: Bayesian anti-phishing toolbar,” IEEE International Conference on Communications, 2008.
G. Liu, B. Qiu, and L. Wenyin, “Automatic detection of phishing target from phishing webpage,” 20th International Conference on Pattern Recognition (ICPR), pp. 4153-4156, 2010.