Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Edge learning for 6G-enabled internet of things: A comprehensive survey of vulnerabilities, datasets, and defenses
The deployment of the fifth-generation (5G) wireless networks in Internet of Everything (IoE)
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …
Machine learning in cybersecurity: a comprehensive survey
Today's world is highly network interconnected owing to the pervasiveness of small personal
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …
The role of machine learning in cybersecurity
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …
systems, and many domains already leverage the capabilities of ML. However, deployment …
Phishing or not phishing? A survey on the detection of phishing websites
Phishing is a security threat with serious effects on individuals as well as on the targeted
brands. Although this threat has been around for quite a long time, it is still very active and …
brands. Although this threat has been around for quite a long time, it is still very active and …
Wild patterns: Ten years after the rise of adversarial machine learning
Deep neural networks and machine-learning algorithms are pervasively used in several
applications, ranging from computer vision to computer security. In most of these …
applications, ranging from computer vision to computer security. In most of these …
A survey of phishing attack techniques, defence mechanisms and open research challenges
AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …
eg, login information, credit/debit card details, and so on. Researchers have developed …
Sok: Explainable machine learning for computer security applications
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine
learning (ML) pipelines. We systematize the increasingly growing (but fragmented) …
learning (ML) pipelines. We systematize the increasingly growing (but fragmented) …
Visualphishnet: Zero-day phishing website detection by visual similarity
Phishing websites are still a major threat in today's Internet ecosystem. Despite numerous
previous efforts, similarity-based detection methods do not offer sufficient protection for the …
previous efforts, similarity-based detection methods do not offer sufficient protection for the …
SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy
The recent surge in phishing incidents in the post-COVID era poses a serious threat towards
the social and economic well-being of users. The escalation in dependency upon the …
the social and economic well-being of users. The escalation in dependency upon the …