Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
Anti-phishing: A comprehensive perspective
Phishing is a form of deception technique that attackers often use to acquire sensitive
information related to individuals and organizations fraudulently. Although Phishing attacks …
information related to individuals and organizations fraudulently. Although Phishing attacks …
Phishing website detection with semantic features based on machine learning classifiers: a comparative study
The phishing attack is one of the main cybersecurity threats in web phishing and spear
phishing. Phishing websites continue to be a problem. One of the main contributions to our …
phishing. Phishing websites continue to be a problem. One of the main contributions to our …
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment
In recent times, we can see a massive increase in the number of devices that are being
connected to the internet. These devices include but are not limited to smartphones, IoT, and …
connected to the internet. These devices include but are not limited to smartphones, IoT, and …
Who are the phishers? phishing scam detection on ethereum via network embedding
Recently, blockchain technology has become a topic in the spotlight but also a hotbed of
various cybercrimes. Among them, phishing scams on blockchain have been found to make …
various cybercrimes. Among them, phishing scams on blockchain have been found to make …
A new hybrid ensemble feature selection framework for machine learning-based phishing detection system
This paper proposes a new feature selection framework for machine learning-based
phishing detection system, called the Hybrid Ensemble Feature Selection (HEFS). In the first …
phishing detection system, called the Hybrid Ensemble Feature Selection (HEFS). In the first …
On the effectiveness of machine and deep learning for cyber security
Machine learning is adopted in a wide range of domains where it shows its superiority over
traditional rule-based algorithms. These methods are being integrated in cyber detection …
traditional rule-based algorithms. These methods are being integrated in cyber detection …
Malicious URL detection using machine learning: A survey
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity.
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
[PDF][PDF] Phishing scam detection on Ethereum: Towards financial security for blockchain ecosystem.
In recent years, blockchain technology has created a new cryptocurrency world and has
attracted a lot of attention. It also is rampant with various scams. For example, phishing …
attracted a lot of attention. It also is rampant with various scams. For example, phishing …
Phishing scams detection in ethereum transaction network
Blockchain has attracted an increasing amount of researches, and there are lots of
refreshing implementations in different fields. Cryptocurrency as its representative …
refreshing implementations in different fields. Cryptocurrency as its representative …