“…Phishing websites. Researchers have extensively addressed phishing attacks by: (1) studying several techniques used by the attackers [24,28,32,34,42,46,47,66,100], (2) determining how phishing detection measures fare against these attacks [26,35,45,61,76,81,85,88,94,103,106,110], and, 3) investigating a myriad of obfuscation strategies used by the attackers to prevent detection by these prevention tools. For detecting phishing websites, researchers have proposed mechanisms that rely on URL blocklists [23,27,70,75,95,99,101] , and machine learning [48,80,82,88,108].…”