Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
This paper proposes a phishing detection technique based on the difference between the
target and actual identities of a webpage. The proposed phishing detection approach, called …
target and actual identities of a webpage. The proposed phishing detection approach, called …
Using case-based reasoning for phishing detection
Many classifications techniques have been used and devised to combat phishing threats,
but none of them is able to efficiently identify web phishing attacks due to the continuous …
but none of them is able to efficiently identify web phishing attacks due to the continuous …
Online corporate communications: website usability and content
Purpose The purpose of this paper is to establish a categorization of corporate websites as
tools of online communication, in accordance with how they apply usability to the content …
tools of online communication, in accordance with how they apply usability to the content …
Detecting phishing websites using automation of human behavior
In this paper, we propose a technique to detect phishing attacks based on behavior of
human when exposed to fake website. Some online users submit fake credentials to the …
human when exposed to fake website. Some online users submit fake credentials to the …
An efficient phishing attack detection using machine learning algorithms
Phishing is an illegal method which involves user's personal information at high risk.
Phishing websites prey individuals, the cloud storage hosting companies and government …
Phishing websites prey individuals, the cloud storage hosting companies and government …
Intelligent methods for accurately detecting phishing websites
A Abuzuraiq, M Alkasassbeh… - 2020 11th International …, 2020 - ieeexplore.ieee.org
With increasing technology developments, there is a massive number of websites with
varying purposes. But a particular type exists within this large collection, the so-called …
varying purposes. But a particular type exists within this large collection, the so-called …
CBR-PDS: a case-based reasoning phishing detection system
Phishing attacks have become the preferred vehicle to gather sensitive information as well
as to deliver dangerous malware. So far, there is still no phishing detection system that can …
as to deliver dangerous malware. So far, there is still no phishing detection system that can …
PhishStack: evaluation of stacked generalization in phishing URLs detection
Stacked Generalization has been assessed and evaluated in the field of Phishing URLs
detection. This field has become egregious area of information security. Recently, different …
detection. This field has become egregious area of information security. Recently, different …
Email phishing detection and prevention by using data mining techniques
Ş Şentürk, E Yerli, İ Soğukpınar - … International Conference on …, 2017 - ieeexplore.ieee.org
Social engineering has emerged as a serious threat in virtual communities and is an
important means to attack information systems. The services used by today's knowledge …
important means to attack information systems. The services used by today's knowledge …