Review Article

Phishing Detection: Analysis of Visual Similarity Based Approaches

Figure 2

Phishing growth by 2005–2015.