Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
Towards an improved understanding of human factors in cybersecurity
Cybersecurity cannot be addressed by technology alone; the most intractable aspects are in
fact sociotechnical. As a result, the'human factor'has been recognised as being the weakest …
fact sociotechnical. As a result, the'human factor'has been recognised as being the weakest …
[HTML][HTML] Which factors predict susceptibility to phishing? An empirical study
Phishing is a cybercrime in active growth that victimizes a large number of individuals and
organizations. To explore which individual and contextual factors predict phishing …
organizations. To explore which individual and contextual factors predict phishing …
Cognition in social engineering empirical research: a systematic literature review
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …
the development and advancement of empirical SE research, making it particularly difficult to …
An explainable multi-modal hierarchical attention model for develo** phishing threat intelligence
Phishing website attack, as one of the most persistent forms of cyber threats, evolves and
remains a major cyber threat. Various detection methods (eg, lookup systems, fraud cue …
remains a major cyber threat. Various detection methods (eg, lookup systems, fraud cue …
A systematic review and research challenges on phishing cyberattacks from an electroencephalography and gaze-based perspective
GA Thomopoulos, DP Lyras, CA Fidas - Personal and Ubiquitous …, 2024 - Springer
Phishing is one of the most important security threats in modern information systems causing
different levels of damages to end-users and service providers such as financial and …
different levels of damages to end-users and service providers such as financial and …
PhishSim: aiding phishing website detection with a feature-free tool
In this paper, we propose a feature-free method for detecting phishing websites using the
Normalized Compression Distance (NCD), a parameter-free similarity measure which …
Normalized Compression Distance (NCD), a parameter-free similarity measure which …
Testing an integrated self-control and routine activities framework to examine malware infection victimization
TJ Holt, J van Wilsem… - Social Science …, 2020 - journals.sagepub.com
Recent research demonstrates that those with low self-control have an increased risk of
victimization due to involvement in routine activities that place them in close proximity to …
victimization due to involvement in routine activities that place them in close proximity to …
Discovering the correlation between phishing susceptibility causing data biases and big five personality traits using C-GAN
Recently, on social media, various kinds of social engineering (SE) have made individuals
more susceptible to attacks. A phishing attempt is a widely used SE technique that takes …
more susceptible to attacks. A phishing attempt is a widely used SE technique that takes …
Information disclosure and privacy paradox: the role of impulsivity
Z Aivazpour, VS Rao - ACM SIGMIS Database: the DATABASE for …, 2020 - dl.acm.org
Self-disclosure of personal information is generally accepted as a security risk. Nonetheless,
many individuals who are concerned about their privacy will often voluntarily reveal …
many individuals who are concerned about their privacy will often voluntarily reveal …