R. Agrawal, T. Imieli´nskiimieli´nski, and A. Swami, Mining Association Rules Between Sets of Items in Large Databases, Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, pp.207-216, 1993.

D. Arthur and S. Vassilvitskii, k-Means++: The Advantages of Careful Seeding, Proceedings of the 18 th Annual ACM-SIAM Symposium on Discrete Algorithms, pp.1027-1035, 2007.

A. Banerjee, D. Barman, M. Faloutsos, and L. N. Bhuyan, Cyber-Fraud is One Typo Away, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, pp.1939-1947, 2008.
DOI : 10.1109/INFOCOM.2008.258

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.8243

T. Holgers, D. E. Watson, and S. D. Gribble, Cutting Through the Confusion: A Measurement Study of Homograph Attacks, Proceedings of the 24 rd Annual USENIX Technical Conference, pp.261-266, 2006.

T. Moore and B. Edelman, Measuring the Perpetrators and Funders of Typosquatting, Proceedings of Financial Cryptography and Data Security, 2010.
DOI : 10.1007/978-3-642-14577-3_15

M. Palage, New gTLDs: Let the Gaming Begin. Part I: TLD Front Running, The Progress & Freedom Foundation, 2009.

Y. Wang, D. Beck, J. Wang, C. Verbowski, and B. Daniels, Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting, Proceedings of USENIX SRUTI, pp.31-36, 2006.