A. Alnajim and M. Munro, An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection, 2009 Sixth International Conference on Information Technology: New Generations, pp.405-410, 2009.
DOI : 10.1109/ITNG.2009.109

A. Internet and P. Committee, Global Phishing Survey: Trends and Domain Name Use in 2H2013, 2013.

Z. Bar-yossef, I. Keidar, and U. Schonfeld, Do not crawl in the DUST, ACM Transactions on the Web, vol.3, issue.1, pp.1-31, 2009.
DOI : 10.1145/1462148.1462151

M. Blythe, H. Petrie, and J. A. Clark, F for fake, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.3469-3478, 2011.
DOI : 10.1145/1978942.1979459

G. Canova, M. Volkamer, C. Bergmann, and R. Borza, NoPhish: An Anti-Phishing Education App, Security and Trust Management, pp.188-192, 2014.
DOI : 10.1007/978-3-319-11851-2_14

G. Canova, M. Volkamer, C. Bergmann, R. Borza, B. Reinheimer et al., Learn to Spot Phishing URLs with the Android NoPhish App, Information Security Education Across the Curriculum, pp.87-100, 2015.
DOI : 10.1007/978-3-319-18500-2_8

URL : https://hal.archives-ouvertes.fr/hal-01334293

G. Canova, M. Volkamer, C. Bergmann, and B. Reinheimer, NoPhish App Evaluation: Lab and Retention Study, Proceedings 2015 Workshop on Usable Security, 2015.
DOI : 10.14722/usec.2015.23009

R. B. Cialdini, J. T. Cacioppo, R. Bassett, and J. A. Miller, Low-ball procedure for producing compliance: Commitment then cost., Journal of Personality and Social Psychology, vol.36, issue.5, p.463, 1978.
DOI : 10.1037/0022-3514.36.5.463

R. Dhamija, J. D. Tygar, and M. Hearst, Why phishing works, Proceedings of the SIGCHI conference on Human Factors in computing systems , CHI '06, pp.581-590, 2006.
DOI : 10.1145/1124772.1124861

R. C. Dodge, C. Carver, and A. J. Ferguson, Phishing for user security awareness, Computers & Security, vol.26, issue.1, pp.73-80, 2007.
DOI : 10.1016/j.cose.2006.10.009

J. Erkkilä, Why we fall for phishing, Conference on Human Factors in Computer Systems. ACM, 2011.

I. Fette, N. Sadeh, and A. Tomasic, Learning to detect phishing emails, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.649-656, 2007.
DOI : 10.1145/1242572.1242660

E. D. Frauenstein and R. Solms, Phishing: How an Organization can Protect Itself, Information Security South Africa Conference, pp.253-268, 2009.

B. Friedman, D. Hurley, D. C. Howe, E. Felten, and H. Nissenbaum, Users' conceptions of web security, CHI '02 extended abstracts on Human factors in computing systems , CHI '02, pp.746-747, 2002.
DOI : 10.1145/506443.506577

S. Garera, N. Provos, M. Chew, and A. D. Rubin, A framework for detection and measurement of phishing attacks, Proceedings of the 2007 ACM workshop on Recurring malcode, WORM '07, pp.1-8, 2007.
DOI : 10.1145/1314389.1314391

T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, Social phishing, Communications of the ACM, vol.50, issue.10, pp.94-100, 2007.
DOI : 10.1145/1290958.1290968

M. Jakobsson, A. Tsow, A. Shah, E. Blevis, and Y. Lim, What Instills Trust? A Qualitative Study of Phishing, FC, pp.356-361, 2007.
DOI : 10.1007/978-3-540-77366-5_32

K. Jansson and R. Solms, Simulating malicious emails to educate end users on-demand, 2011 3rd Symposium on Web Society, pp.74-80, 2011.
DOI : 10.1109/SWS.2011.6101274

M. Khonji, Y. Iraqi, and A. Jones, Phishing Detection: A Literature Survey, IEEE Communications Surveys & Tutorials, vol.15, issue.4, pp.2091-2121, 2013.
DOI : 10.1109/SURV.2013.032213.00009

I. Kirlappos and M. A. Sasse, Security Education against Phishing: A Modest Proposal for a Major Rethink, IEEE Security & Privacy Magazine, vol.10, issue.2, pp.24-32, 2012.
DOI : 10.1109/MSP.2011.179

P. Kumaraguru, Y. Rhee, A. Acquisti, L. F. Cranor, J. Hong et al., Protecting people from phishing, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, pp.905-914, 2007.
DOI : 10.1145/1240624.1240760

P. Kumaraguru, Y. Rhee, S. Sheng, S. Hasan, A. Acquisti et al., Getting users to pay attention to anti-phishing education, Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit on , eCrime '07, pp.70-81, 2007.
DOI : 10.1145/1299015.1299022

P. Kumaraguru, S. Sheng, A. Acquisti, L. F. Cranor, and J. Hong, Teaching Johnny not to fall for phish, ACM Transactions on Internet Technology, vol.10, issue.2, pp.1-7, 2010.
DOI : 10.1145/1754393.1754396

L. Li and M. Helenius, Usability evaluation of anti-phishing toolbars, Journal in Computer Virology, vol.3, issue.4, pp.163-184, 2007.
DOI : 10.1007/s11416-007-0050-4

E. Lin, S. Greenberg, E. Trotter, D. Ma, and J. Aycock, Does domain highlighting help people identify phishing sites? In CHI, pp.2075-2084, 2011.

J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, Beyond blacklists, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pp.1245-1254, 2009.
DOI : 10.1145/1557019.1557153

S. Marchal, J. François, and T. Engel, Proactive Discovery of Phishing Related Domain Names, Attacks, Intrusions, and Defenses, pp.190-209, 2012.
DOI : 10.1007/978-3-642-33338-5_10

URL : https://hal.archives-ouvertes.fr/hal-00748808

M. Maurer and D. Herzner, Using visual website similarity for phishing detection and reporting, Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts, CHI EA '12, pp.1625-1630, 2012.
DOI : 10.1145/2212776.2223683

M. Maurer, A. D. Luca, and S. Kempe, Using data type based security alert dialogs to raise online security awareness, Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, 2011.
DOI : 10.1145/2078827.2078830

R. Naidoo, Analysing Urgency and Trust Cues Exploited in Phishing Scam Designs, 10th International Conference on Cyber Warfare and Security Academic Conferences Limited, p.216, 2015.

P. Prakash, M. Kumar, R. R. Kompella, and M. Gupta, PhishNet: Predictive Blacklisting to Detect Phishing Attacks, 2010 Proceedings IEEE INFOCOM, pp.1-5, 2010.
DOI : 10.1109/INFCOM.2010.5462216

J. J. Rusch, The " social engineering " of Internet fraud, Internet Society Annual Conference. Internet Society, 1999.

S. Sheng, B. Magnien, P. Kumaraguru, A. Acquisti, L. F. Cranor et al., Anti-Phishing Phil, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pp.88-99, 2007.
DOI : 10.1145/1280680.1280692

F. Stajano and P. Wilson, Understanding scam victims, Communications of the ACM, vol.54, issue.3, pp.70-75, 2011.
DOI : 10.1145/1897852.1897872

R. Verma, N. Shashidhar, and N. Hossain, Detecting Phishing Emails the Natural Language Way, ESORICS, pp.824-841, 2012.
DOI : 10.1007/978-3-642-33167-1_47

A. Vishwanath, T. Herath, R. Chen, J. Wang, and H. R. Rao, Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model, Decision Support Systems, vol.51, issue.3, pp.576-586, 2011.
DOI : 10.1016/j.dss.2011.03.002

J. Wang, R. Chen, T. Herath, and H. Rao, An empirical exploration of the design pattern of phishing attacks, Inform. Assurance, 2009.

. Webroot, Webroot 2015 Threat Brief, 2016.

M. Wu, R. C. Miller, and S. L. Garfinkel, Do security toolbars actually prevent phishing attacks? In CHI, pp.601-610, 2006.

Z. Xu and W. Zhang, Victimized by Phishing: A Heuristic-Systematic Perspective, ARRAY Development, 2012.

Y. Zhang, S. Egelman, L. F. Cranor, and J. Hong, Phinding Phish: Evaluating Anti-Phishing Tools, In NDSS. School of Computer Science, 2007.