Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Human factors in phishing attacks: a systematic literature review
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …
trustworthy entity in digital communication. It is a type of cyber attack often successful …
Mobile phishing attacks and defence mechanisms: State of art and open research challenges
Phishing is an online identity theft in which an attacker tries to steal user's personal
information, resulting in financial loss of individuals as well as organisations. Nowadays …
information, resulting in financial loss of individuals as well as organisations. Nowadays …
An investigation of phishing awareness and education over time: When and how to best remind users
Security awareness and education programmes are rolled out in more and more
organisations. However, their effectiveness over time and, correspondingly, appropriate …
organisations. However, their effectiveness over time and, correspondingly, appropriate …
A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
{Sok}: Still plenty of phish in the sea—a taxonomy of {user-oriented} phishing interventions and avenues for future research
Phishing is a prevalent cyber threat, targeting individuals and organizations alike. Previous
approaches on anti-phishing measures have started to recognize the role of the user, who …
approaches on anti-phishing measures have started to recognize the role of the user, who …
{DeepPhish}: Understanding user trust towards artificially generated profiles in online social networks
Fabricated media from deep learning models, or deepfakes, have been recently applied to
facilitate social engineering efforts by constructing a trusted social persona. While existing …
facilitate social engineering efforts by constructing a trusted social persona. While existing …
Debunking rumors on social media: The use of denials
The literature currently lacks an understanding of how denials can be crafted to effectively
debunk rumors on social media. Underpinned by the theory of planned behavior, this …
debunk rumors on social media. Underpinned by the theory of planned behavior, this …
A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead
In the last decades, research has shown that both technical solutions and user perceptions
are important to improve security and privacy in the digital realm. The field of 'usable …
are important to improve security and privacy in the digital realm. The field of 'usable …
Gui-squatting attack: Automated generation of android phishing apps
Mobile phishing attacks, such as mimic mobile browser pages, masquerade as legitimate
applications by leveraging repackaging or clone techniques, have caused varied yet …
applications by leveraging repackaging or clone techniques, have caused varied yet …
Design and evaluation of inclusive email security indicators for people with visual impairments
Due to the challenges to detect and filter phishing emails, it is inevitable that some phishing
emails can still reach a user's inbox. As a result, email providers such as Gmail have …
emails can still reach a user's inbox. As a result, email providers such as Gmail have …