1. Cidon, A., Korshun, N., Schweighauser, M., Tsitkin, A., Gavish, L., and Bleier, I. (2019, January 14–16). High Precision Detection of Business Email Compromise High Precision Detection of Business Email Compromise. Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), California, USA. Available online: https://www.usenix.org/system/files/sec19-cidon.pdf.
2. Exploiting trust for financial gain: An overview of business email compromise (BEC) fraud;Cross;J. Financ. Crime,2020
3. A survey of emerging threats in cybersecurity;Nepal;J. Comput. Syst. Sci.,2014
4. Nisha, T.N., Bakari, D., and Shukla, C. (2021, January 4–5). Business E-mail Compromise—Techniques and Countermeasures. Proceedings of the 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India.
5. Teerakanok, S., Yasuki, H., and UEHARA, T. (2020, January 11–14). A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice Checksum. Proceedings of the 2020 IEEE 20th Innternational Conference on Software Quality, Reliability and Security Companion (QRS-C), Macau, China.