Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Phishing attacks survey: Types, vectors, and technical approaches
R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
Malware dynamic analysis evasion techniques: A survey
The cyber world is plagued with ever-evolving malware that readily infiltrate all defense
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …
Attacks on the Industrial Internet of Things–Development of a multi-layer Taxonomy
S Berger, O Bürger, M Röglinger - Computers & Security, 2020 - Elsevier
Abstract The Industrial Internet of Things (IIoT) provides new opportunities to improve
process and production efficiency, which enable new business models. At the same time …
process and production efficiency, which enable new business models. At the same time …
Awareness of phishing attacks in the public sector: Review types and technical approaches
Today, phishing attempts are a major problem and a significant cyber risk. Phishing is one of
the most common ways attackers try to steal money on the Internet. Phishing attacks can …
the most common ways attackers try to steal money on the Internet. Phishing attacks can …
D2M: Dynamic Defense and Modeling of Adversarial Movement in Networks
Given a large enterprise network of devices and their authentication history (eg, device
logons), how can we quantify network vulnerability to lateral attack and identify at-risk …
logons), how can we quantify network vulnerability to lateral attack and identify at-risk …
The Peculiar Case of Tailored Phishing against SMEs: Detection and Collective DefenseMechanisms at a Small IT Company
Phishing attacks are increasingly more sophisticated, with attackers exploiting publicly
available information on their targets to personalize their attacks. Although an increasing …
available information on their targets to personalize their attacks. Although an increasing …
[PDF][PDF] A literature reviewon sniffing attacks in computernetwork
A Kulshrestha, SK Dubey - International Journal of Advanced …, 2014 - academia.edu
In today's modern era, the internet plays very important role among communications of
various stakeholders. Internet creates a link between client and server. But the interface …
various stakeholders. Internet creates a link between client and server. But the interface …
[PDF][PDF] YALIH, yet another low interaction honeyclient
Low-interaction honeyclients employ static detection techniques such as signatures,
heuristic or anomaly detection in the identification of malicious websites. They are …
heuristic or anomaly detection in the identification of malicious websites. They are …
TypoWriter: a tool to prevent typosquatting
Typosquatting is a form of internet cybersquatting generated from the mistakes (typos) made
by internet users while ty** a website address. It often leads the user to another …
by internet users while ty** a website address. It often leads the user to another …
Dbdhunter: an ensemble-based anomaly detection approach to detect drive-by download attacks
Drive-by download attacks, typically implemented in JavaScript, are among the most
common attack vectors in recent years. To confront these attacks, several anomaly detection …
common attack vectors in recent years. To confront these attacks, several anomaly detection …