Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Perception layer security in Internet of Things
Abstract Internet of Things (IoT) is one of the rising innovations of the current era that has
largely attracted both the industry and the academia. Life without the IoT is entirely …
largely attracted both the industry and the academia. Life without the IoT is entirely …
[HTML][HTML] A predictive model for phishing detection
Nowadays, many anti-phishing systems are being developed to identify phishing contents in
online communication systems. Despite the availability of myriads anti-phishing systems …
online communication systems. Despite the availability of myriads anti-phishing systems …
[HTML][HTML] PhiDMA–A phishing detection model with multi-filter approach
Phishing remains a basic security issue in the cyberspace. In phishing, assailants steal
sensitive information from victims by providing a fake site which looks like the visual clone of …
sensitive information from victims by providing a fake site which looks like the visual clone of …
Phishing detection: A recent intelligent machine learning comparison based on models content and features
N Abdelhamid, F Thabtah… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
In the last decade, numerous fake websites have been developed on the World Wide Web to
mimic trusted websites, with the aim of stealing financial assets from users and …
mimic trusted websites, with the aim of stealing financial assets from users and …
A phishing detection system based on machine learning
CY Wu, CC Kuo, CS Yang - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
As the Internet has become an essential part of human beings' lives, a growing number of
people are enjoying the convenience brought by the Internet, while more are attacks coming …
people are enjoying the convenience brought by the Internet, while more are attacks coming …
AntiPhishStack: LSTM-based stacked generalization model for optimized phishing URL detection
The escalating reliance on revolutionary online web services has introduced heightened
security risks, with persistent challenges posed by phishing despite extensive security …
security risks, with persistent challenges posed by phishing despite extensive security …
Data mining a way to solve Phishing Attacks
PK Sahoo - 2018 International Conference on Current Trends …, 2018 - ieeexplore.ieee.org
With the ever increasing use of Internet by different stake holders in various fields,
information on web browsers and servers is highly susceptible to different security attacks …
information on web browsers and servers is highly susceptible to different security attacks …
Identification of phishing attacks using machine learning algorithm
PM Dinesh, M Mukesh, B Navaneethan… - E3S Web of …, 2023 - e3s-conferences.org
Phishing is a particular type of cybercrime that allows criminals to trick people and steal
crucial data. The phishing assault has developed into a more complex attack vector since …
crucial data. The phishing assault has developed into a more complex attack vector since …
PhishStack: evaluation of stacked generalization in phishing URLs detection
Stacked Generalization has been assessed and evaluated in the field of Phishing URLs
detection. This field has become egregious area of information security. Recently, different …
detection. This field has become egregious area of information security. Recently, different …
A lightweight and proactive rule-based incremental construction approach to detect phishing scam
M SatheeshKumar, KG Srinivasagan… - Information Technology …, 2022 - Springer
The development of digitization over the globe has made digital security inescapable. As
every single article on this planet is being digitalized quickly, it is more important to protect …
every single article on this planet is being digitalized quickly, it is more important to protect …