Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Mitigation strategies against the phishing attacks: A systematic literature review
Phishing attacks are among the most prevalent attack mechanisms employed by attackers.
The consequences of successful phishing include (and are not limited to) financial losses …
The consequences of successful phishing include (and are not limited to) financial losses …
[HTML][HTML] A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness
Background: Phishing is a malicious attempt by cyber attackers to steal personal information
through deception. Phishing attacks are often aided by carefully crafted phishing emails …
through deception. Phishing attacks are often aided by carefully crafted phishing emails …
Phishing in organizations: Findings from a large-scale and long-term study
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …
we conducted in collaboration with a partner company. Our experiment ran for 15 months …
From chatbots to phishbots?: Phishing scam generation in commercial large language models
The advanced capabilities of Large Language Models (LLMs) have made them invaluable
across various applications, from conversational agents and content creation to data …
across various applications, from conversational agents and content creation to data …
Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails
Lack of personalisation and poor mechanics (eg, grammar, spelling and punctuation) are
commonly cited as cues of deception that people can use to identify phishing emails …
commonly cited as cues of deception that people can use to identify phishing emails …
GramBeddings: a new neural network for URL based identification of phishing web pages through n-gram embeddings
There has been ever-growing use of Internet and progress within many communication
channels such as social media and this escalates the need for rapid and low source …
channels such as social media and this escalates the need for rapid and low source …
Internet-based social engineering psychology, attacks, and defenses: A survey
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …
serve as the first step in a sophisticated sequence of attacks that target, among other things …
{“To} Do This Properly, You Need More {Resources”}: The Hidden Costs of Introducing Simulated Phishing Campaigns
L Brunken, A Buckmann, J Hielscher… - 32nd USENIX Security …, 2023 - usenix.org
Many organizations use phishing simulation campaigns to raise and measure their
employees' security awareness. They can create their own campaigns, or buy phishing-as-a …
employees' security awareness. They can create their own campaigns, or buy phishing-as-a …
Experimental investigation of technical and human factors related to phishing susceptibility
This article reports on a simulated phishing experiment targeting 6,938 faculty and staff at
George Mason University. The three-week phishing campaign employed three types of …
George Mason University. The three-week phishing campaign employed three types of …
[HTML][HTML] Chatbots for active learning: A case of phishing email identification
Chatbots represent a promising approach to provide instructional content and facilitate
active learning processes. However, there is a lack of knowledge as how to design chatbot …
active learning processes. However, there is a lack of knowledge as how to design chatbot …