Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Comprehensive review of cybercrime detection techniques
Cybercrimes are cases of indictable offences and misdemeanors that involve computers or
communication tools as targets and commission instruments or are associated with the …
communication tools as targets and commission instruments or are associated with the …
SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
A stacking model using URL and HTML features for phishing webpage detection
Y Li, Z Yang, X Chen, H Yuan, W Liu - Future Generation Computer …, 2019 - Elsevier
In this paper, we present a stacking model to detect phishing webpages using URL and
HTML features. In terms of features, we design lightweight URL and HTML features and …
HTML features. In terms of features, we design lightweight URL and HTML features and …
Phishing detection: analysis of visual similarity based approaches
AK Jain, BB Gupta - Security and Communication Networks, 2017 - Wiley Online Library
Phishing is one of the major problems faced by cyber‐world and leads to financial losses for
both industries and individuals. Detection of phishing attack with high accuracy has always …
both industries and individuals. Detection of phishing attack with high accuracy has always …
New rule-based phishing detection method
In this paper, we present a new rule-based method to detect phishing attacks in internet
banking. Our rule-based method used two novel feature sets, which have been proposed to …
banking. Our rule-based method used two novel feature sets, which have been proposed to …
Anti-phishing: A comprehensive perspective
Phishing is a form of deception technique that attackers often use to acquire sensitive
information related to individuals and organizations fraudulently. Although Phishing attacks …
information related to individuals and organizations fraudulently. Although Phishing attacks …
Detection of online phishing email using dynamic evolving neural network based on reinforcement learning
Despite state-of-the-art solutions to detect phishing attacks, there is still a lack of accuracy for
the detection systems in the online mode which is leading to loopholes in web-based …
the detection systems in the online mode which is leading to loopholes in web-based …
Intelligent phishing detection scheme using deep learning algorithms
Purpose Phishing attacks have evolved in recent years due to high-tech-enabled economic
growth worldwide. The rise in all types of fraud loss in 2019 has been attributed to the …
growth worldwide. The rise in all types of fraud loss in 2019 has been attributed to the …
Intelligent web-phishing detection and protection scheme using integrated features of Images, frames and text
A phishing attack is one of the most significant problems faced by online users because of its
enormous effect on the online activities performed. In recent years, phishing attacks continue …
enormous effect on the online activities performed. In recent years, phishing attacks continue …
Phishing attacks detection using deep learning approach
In the COVID-19 pandemic, people are enforced to adopt 'work from home'policy. The
Internet has become an effective channel for social interactions nowadays. Peoples' …
Internet has become an effective channel for social interactions nowadays. Peoples' …