[1] H. Bahrami, “Improving IWO Algorithm in Generation Optimization Problems using Experiment Design,” M.Sc. Thesis, Ferdosi Univ., Mashhad, 2010. (In Persian)##
[2] M. Moghimi, H. Albaripoor, and M. R. Amin-Naseri, “Expert System Designing for Phishing Attacks Detection in E-Banking,” Journal of Iranian Association of Electrical and Electronics Engineers, vol. 12(2), 2015. (In Persian)##
[3] B. Bahreini, A. Malahzadeh, and M. Soleimani, “Antenna Array Designing using IWO algorithm for MIMO systems in 5.8 GHz frequency,” 18th Iran Electrical Engineering Conference, 2010. (In Persian)##
[4] M. Alsharnouby, F. Alaca, and S. Chiasson, “Why phishing still works: user strategies for combating phishing attacks,” Int. J. Hum-Comput. St., vol. 82, pp. 69-82, 2008.##
[5] H. Rahimi, I. Rahmi, and J. H. Abawajy, “An approach for profiling phishing activities,” Cumpot. Secur., vol. 45, pp. 27-41, 2014.##
[6] W. D. Yu, S. Nargundkar, and N. Tiruthani, “A phishing vulnerability analysis of web based systems,” Cumput. Commun., pp. 326-331, 2008.##
[7] B. Vucetic and J. Yuan, “Space-time coding,” JWS, 2003.##
[8] K. R. Sahu and J. Dubey, “A Survey on Phishing Attacks,” Int. J. Comut. Appl., vol. 88, 2014.##
[9] N. Abdelhamid, A. Aladdin, and T. Fadi, “Phishing detection based associative classification data mining,” Expert. Sys. Appl., vol. 41 pp. 5948-5959, 2014.##
[10] C. L. Tan, C. Kang Leng, and W. KokSheik, “PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder,” Decis. Support Syst., vol. 88, pp.18-27, 2016.##
[11] N. A. G. Arachchilage and S. Love, “Security awareness of computer users: A phishing threat avoidance perspective,” Comput. Human Behav., vol. 38, pp. 304-312, 2014.##
[12] Y. Li, L. Yang, and J. Ding, “A minimum enclosing ball-based support vector machine approach for detection of phishing websites,” OPTIC (Stuttg), vol. 127.1, pp. 345-351, 2016.##
[13] K. Parsons, A. McCormac, M. Pattinson, M. Butavicius, and C. Jerram, “The design of phishing studies: Challenges for researchers,” Comput. Secur., vol. 52, pp.194-206, 2016.##
[14] M. Zabihimayvan and D. Doran, “Fuzzy rough set feature selection to enhance phishing attack detection,” Fuzz-IEEE, pp. 1-6, 2019.##
[15] T. Lam and H. Kettani, “PhAttApp: A Phishing Attack Detection Application,” 3rd International Conference on Information System and Data Mining, pp. 154-158, 2019.##
[16] B. Gupta and A. K. Jain, “Phishing Attack Detection using a Search Engine and Heuristics-based Technique,” J. Inf. Technol-Uk, vol. 13, pp. 94-109, 2020.##
[17] P. Yang, G. Zhao, and P. Zeng, “Phishing website detection based on multidimensional features driven by deep learning,” IEEE ACCESS, vol. 7, pp. 15196-15209, 2019.##
[18] UCI Machine Learning Repository, “Phishing Websites Dataset,” 2015. archive.ics.uci.edu/ml/datasets/phishing+websites.##