1 |
FSEC, "2020 Cybersecurity Issue Forecast Report," http://www.fsec.or.kr/fsec/index.do, Mar. 2020
|
2 |
KISA, "2019 KISA Cyber Threat Trend Report," KISA,https://www.krcert.or.kr/data/reportView.do?bulletin_writing_sequence=35239, Feb. 2020
|
3 |
Trendmicro, "Business Email Compromise," https://www.trendmicro.com/vinfo/us/security/definition/businessemail-compromise-(bec), Mar. 2020
|
4 |
R Sikorski, R Peters, "A privacy primer for the Web: spam, bread crumbs, and cookies," The Journal of the American Medical Association, ISSN 0098-7484, E-ISSN 1538-3598, Apr. 1998
|
5 |
Hinde Stephen, "Spam: the evolution of a nuisance," pp. 474-478, ISSN 0167-4048, Sept. 2003
|
6 |
W.G. Hoover, C.G. Hoover, "SPAM-based recipes for continuum simulations," pp. 78-85, ISSN 1521-9615, Mar/Apr. 2001
|
7 |
DuBoff, Leonard D, King, Christy O, Educators Beware, "Avoiding the Scams," pp. 11-13, ISSN 8756-3894, E-ISSN 1559-7075, Mar/Apr. 2009
|
8 |
Deborah Schaffer, "THE LANGUAGE OF SCAM SPAMS: LINGUISTIC FEATURES OF NIGERIAN FRAUD E-MAILS," pp. 157-179, ISSN 0014-164X , Apr. 2012
|
9 |
FBI, "FBI IC3 2019 Internet Crime Report," https://www.fbi.gov/news/stories/2019-internet-crime-report-released-021120, Jan. 2020
|
10 |
Peter Ribic, "The Nigerian email scam novel," pp. 424-436, ISSN 1744-9855, Jan. 2019
|
11 |
Blanzieri, Enrico and Anton Bryl, "A survey of learning-based techniques of email spam filtering," Artificial Intelligence Review 29.1, pp. 63-92, July. 2008
DOI
|
12 |
JAKOBSSON and Bjorn Markus, "Detection of business email compromise," U.S. Patent Application No 15/414,489, Aug. 2017.
|
13 |
ZWEIGHAFT and David, "Business email compromise and executive impersonation: are financial institutions exposed?," Journal of Investment Compliance, May. 2017.
|
14 |
Hyun-Jun Kirn, Jason J. Jung and 0eun-Sik Jo. "Spam-Mail Filtering System Using Weighted Bayesian Classifier," Journal of KIISE: software and usage products 31.8, pp. 1092-1100, Aug. 2004
|
15 |
Wikipedia, "email header Standard," https://tools.ietf.org/html/rfc822, Feb. 2020
|
16 |
BecomingHuman.AI, "AI algorithms," https://becominghuman.ai/, Feb. 2020
|
17 |
Microsoft, "ML Algorithms Sheet," https://docs.microsoft.com/, Feb. 2020
|
18 |
Wikipedia, "Confusion Matrix," https://en.wikipedia.org/wiki/Confusion_matrix, Mar. 2020
|
19 |
Sango Lee, "Spam-Filtering by Identifying Automatically Generated Email Accounts," Journal of the Society of Information Sciences," Software and Applications 32.5, pp. 378-384, May. 2005
|
20 |
Jindal, Nitin, and Bing Liu. "Review spam detection," Proceedings of the 16th international conference on World Wide Web, pp. 1189-1190, May. 2007.
|
21 |
Markines, Benjamin, Ciro Cattuto, and Filippo Menczer. "Social spam detection," Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web, pp. 41-48, Apr. 2009.
|
22 |
Barreno, Marco, et al. "The security of machine learning," Machine Learning 81.2, pp. 121-148, Apr. 2010
DOI
|
23 |
Remorin, Lord, Ryan Flores, and Bakuei Matsukawa, "Tracking Trends in Business Email Compromise (BEC) Schemes," Trend Micro 18.1, 2018
|
24 |
Buczak, Anna L., and Erhan Guven. "A survey of data mining and machine learning methods for cyber security intrusion detection," IEEE Communications surveys & tutorials 18.2, pp. 1153-1176, Oct. 2015
DOI
|
25 |
Blog, "levenshtein algorithm," https://www.cuelogic.com/blog/the-levenshtein-algorithm, Jan. 2020
|
26 |
Papernot, Nicolas, et al. "Towards the science of security and privacy in machine learning," :1611.03814, Nov. 2016
|
27 |
Akinyelu, Andronicus A and Aderemi O. Adewumi, "Classification of phishing email using random forest machine learning technique," Journal of Applied Mathematics 2014, Apr. 2014
|
28 |
Academic Information, "BEC, SCAM, social engineering," https://academic.naver.com/, Feb, 2020
|
29 |
Scholar, "BEC, SCAM, social engineering," https://scholar.google.co.kr/,Feb, 2020
|