has been cited by the following article(s):
|
[1]
|
A Review of Tactics, Techniques, and Procedures (TTPs) of MITRE Framework for Business Email Compromise (BEC) Attacks
IEEE Access,
2025
DOI:10.1109/ACCESS.2025.3552523
|
|
|
|
|
[2]
|
Business email compromise: A systematic review of understanding, detection, and challenges
Computers & Security,
2025
DOI:10.1016/j.cose.2025.104630
|
|
|
|
|
[3]
|
Business Email Compromise: A Comprehensive Taxonomy for Detection and Prevention
Proceedings of the 2024 7th International Conference on Information Science and Systems,
2024
DOI:10.1145/3700706.3700714
|
|
|
|