“…Page similarity has been extensively investigated in the literature to detect phishing web pages (see, e.g., [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58]). In fact, as already pointed out, web pages are made in a way to look very similar or identical to their legitimate counterparts, thus their similarity is a good indicator of a phishing attack.…”