Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Less defined knowledge and more true alarms: Reference-based phishing detection without a pre-defined reference list
Phishing, a pervasive form of social engineering attack that compromises user credentials,
has led to significant financial losses and undermined public trust. Modern phishing …
has led to significant financial losses and undermined public trust. Modern phishing …
Advancements of SMS Spam Detection: A Comprehensive Survey of NLP and ML Techniques
In the digital age, the ubiquity of text messaging has unfortunately paved the way for SMS
phishing, or'smishing,'a deceptive practice where fraudsters dispatch fraudulent messages …
phishing, or'smishing,'a deceptive practice where fraudsters dispatch fraudulent messages …
Classifying swahili smishing attacks for mobile money users: A machine-learning approach
Due to the massive adoption of mobile money in Sub-Saharan countries, the global
transaction value of mobile money exceeded 2 billion in 2021. Projections show transaction …
transaction value of mobile money exceeded 2 billion in 2021. Projections show transaction …
On sms phishing tactics and infrastructure
In 2022, the Anti-Phishing Working Group reported a 70% increase in SMS and voice
phishing attacks. Hard data on SMS phishing is hard to come by, as are insights into how …
phishing attacks. Hard data on SMS phishing is hard to come by, as are insights into how …
Canary in twitter mine: Collecting phishing reports from experts and non-experts
The rise in phishing attacks via e-mail and short message service (SMS) has not slowed
down at all. The first thing we need to do to combat the ever-increasing number of phishing …
down at all. The first thing we need to do to combat the ever-increasing number of phishing …
Phishreplicant: A language model-based approach to detect generated squatting domain names
Domain squatting is a technique used by attackers to create domain names for phishing
sites. In recent phishing attempts, we have observed many domain names that use multiple …
sites. In recent phishing attempts, we have observed many domain names that use multiple …
[HTML][HTML] Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection
Phishing attacks are on the rise, and phishing websites are everywhere, denoting the
brittleness of security mechanisms reliant on blocklists. To cope with this threat, many works …
brittleness of security mechanisms reliant on blocklists. To cope with this threat, many works …
Detecting illegal online gambling (IOG) services in the mobile environment
Despite the extensive ramifications of illegal online gambling (IOG) services, actions taken
by government authorities have had little effect in halting these operations. In order to …
by government authorities have had little effect in halting these operations. In order to …
A Machine Learning Approach for Efficient Spam Detection in Short Messaging System (SMS)
RG de Luna, VC Magnaye, RAL Reaño… - TENCON 2023-2023 …, 2023 - ieeexplore.ieee.org
Short Message Service (SMS) is a generally used communication method due to its
convenience and affordability. SMS spam message is an unauthorized text message that …
convenience and affordability. SMS spam message is an unauthorized text message that …
Enhancing Spear Phishing Defense with AI: A Comprehensive Review and Future Directions.
This paper presents a critical analysis of the role of Artificial Intelligence (AI) in defending
against spear phishing attacks, which continue to be a significant cybersecurity threat. By …
against spear phishing attacks, which continue to be a significant cybersecurity threat. By …