Li L, Berki E, Helenius M and Ovaska S.
(2014). Towards a contingency approach with whitelist-and blacklist-based anti-phishing applications. Behaviour & Information Technology. 33:11. (1136-1147). Online publication date: 1-Nov-2014.https://doi.org/10.1080/0144929X.2013.875221