Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Cybercrime threat intelligence: A systematic multi-vocal literature review
Significant cybersecurity and threat intelligence analysts agree that online criminal activity is
increasing exponentially. To offer an overview of the techniques and indicators to perform …
increasing exponentially. To offer an overview of the techniques and indicators to perform …
Detecting and preventing cyber insider threats: A survey
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …
security threats, the majority of which are originated by insiders. As insiders reside behind …
Malicious URL detection using machine learning: A survey
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity.
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
A stacking model using URL and HTML features for phishing webpage detection
Y Li, Z Yang, X Chen, H Yuan, W Liu - Future Generation Computer …, 2019 - Elsevier
In this paper, we present a stacking model to detect phishing webpages using URL and
HTML features. In terms of features, we design lightweight URL and HTML features and …
HTML features. In terms of features, we design lightweight URL and HTML features and …
Adversarial deep ensemble: Evasion attacks and defenses for malware detection
Malware remains a big threat to cyber security, calling for machine learning based malware
detection. While promising, such detectors are known to be vulnerable to evasion attacks …
detection. While promising, such detectors are known to be vulnerable to evasion attacks …
Anti-phishing: A comprehensive perspective
Phishing is a form of deception technique that attackers often use to acquire sensitive
information related to individuals and organizations fraudulently. Although Phishing attacks …
information related to individuals and organizations fraudulently. Although Phishing attacks …
Detecting malicious urls using lexical analysis
The Web has long become a major platform for online criminal activities. URLs are used as
the main vehicle in this domain. To counter this issues security community focused its efforts …
the main vehicle in this domain. To counter this issues security community focused its efforts …
CatchPhish: detection of phishing websites by inspecting URLs
There exists many anti-phishing techniques which use source code-based features and third
party services to detect the phishing sites. These techniques have some limitations and one …
party services to detect the phishing sites. These techniques have some limitations and one …
A survey and classification of web phishing detection schemes
Phishing is a fraudulent technique that is used over the Internet to deceive users with the
goal of extracting their personal information such as username, passwords, credit card, and …
goal of extracting their personal information such as username, passwords, credit card, and …
Jail-Phish: An improved search engine based phishing detection system
Stealing of sensitive information (username, password, credit card information and social
security number, etc.) using a fake webpage that imitates trusted website is termed as …
security number, etc.) using a fake webpage that imitates trusted website is termed as …