台灣固網:付費語音資訊服務(2006),http://www.tfn.net.tw/ 4243.asp。
台灣微軟SQL Server 2005 線上叢書,Microsoft 貝氏機率分類演算法(2006),http://msdn2.microsoft.com/zh-tw/ library/ms174806.aspx
電信經營業者的痛-電話盜撥(1998, November),台灣通訊雜誌,92-95。
黃德輝(2002),有線電話通話異常偵測系統之建置,國立中央大學。鄭富山(2001),應用資料探勘偵測電信資料異常之研究,輔仁大學。秉昱科技(2001),模糊邏輯與類神經模糊在商業和財政的應用(2版),著者發行。
Compaq Solution for Fraud Management. (2001). Compaq Computer Corporation.
David West. (2000, July). Battle Tactics -Fighting Fraud with Common Sense, Telecom Business Magazine, http://www.equinoxis.com/battle-tactics.html.
Fawcett T. & Provost F.. (1997). Adaptive fraud detection, Data Mining and Knowledge Discovery, vol. 1(3), pp. 291-316,.
Fraud Primer. (2002, November). Cerebrus Solutions Limited, Issue 2.3, p. 6.
Håkan Kvarnström, Emilie Lundin, & Erland Jonsson. (2000, October). Combining fraud and intrusion detection - meeting new requirements, Proceedings of the fifth Nordic Workshop on Secure IT systems (NordSec2000), Reykjavik, Iceland.
Jiawei Han & Micheline Kamber. (2001). So, What Is Data Mining?, Data Mining – Concepts and Techniques, Morgan Kaufmann. pp. 5-8.
Michael Collins. (1999). Telecommunications Crime – Part 1, Computers & Security, pp. 577-586.
Michael Collins. (1999). Telecommunications Crime – Part 2, Computers & Security, pp. 683-692.
Michael Collins, (2000). Telecommunications Crime – Part 3, Computers & Security, pp. 141-148.
Michael H. Cahill, Diane Lambert, Jos´e C. Pinheiro, & Don X. Sun. (2002). Detecting Fraud In The Realworld, Handbook of Massive Data Sets (Massive Computing, 4), Kluwer Academic Publishers. pp. 911-929.
Results of Worldwide Telecom Fraud Survey. (2003, March). Communications Fraud Control Association. http://www.cfca.org/pressrelease/Fraud-Loss%20%20press%20release%203-03.doc.
Wong K.. (1996 November). Mobile Phone Fraud - Are GSM Networks Secure?. Computer Fraud and Security Bulletin, pp. 11-18.