Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Phishing environments, techniques, and countermeasures: A survey
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …
web, mobile, and social networking technologies. Previous phishing taxonomies have …
Fighting against phishing attacks: state of the art and future challenges
In the last few years, phishing scams have rapidly grown posing huge threat to global
Internet security. Today, phishing attack is one of the most common and serious threats over …
Internet security. Today, phishing attack is one of the most common and serious threats over …
[HTML][HTML] Phishing attacks: A recent comprehensive study and a new anatomy
With the significant growth of internet usage, people increasingly share their personal
information online. As a result, an enormous amount of personal information and financial …
information online. As a result, an enormous amount of personal information and financial …
Phishing or not phishing? A survey on the detection of phishing websites
Phishing is a security threat with serious effects on individuals as well as on the targeted
brands. Although this threat has been around for quite a long time, it is still very active and …
brands. Although this threat has been around for quite a long time, it is still very active and …
A survey of phishing attack techniques, defence mechanisms and open research challenges
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …
eg, login information, credit/debit card details, and so on. Researchers have developed …
Who are the phishers? phishing scam detection on ethereum via network embedding
Recently, blockchain technology has become a topic in the spotlight but also a hotbed of
various cybercrimes. Among them, phishing scams on blockchain have been found to make …
various cybercrimes. Among them, phishing scams on blockchain have been found to make …
Defending against phishing attacks: taxonomy of methods, current issues and future directions
Internet technology is so pervasive today, for example, from online social networking to
online banking, it has made people's lives more comfortable. Due the growth of Internet …
online banking, it has made people's lives more comfortable. Due the growth of Internet …
Phishpedia: A hybrid deep learning based approach to visually identify phishing webpages
Recent years have seen the development of phishing detection and identification
approaches to defend against phishing attacks. Phishing detection solutions often report …
approaches to defend against phishing attacks. Phishing detection solutions often report …
Visualphishnet: Zero-day phishing website detection by visual similarity
Phishing websites are still a major threat in today's Internet ecosystem. Despite numerous
previous efforts, similarity-based detection methods do not offer sufficient protection for the …
previous efforts, similarity-based detection methods do not offer sufficient protection for the …
Phishing detection: analysis of visual similarity based approaches
Phishing is one of the major problems faced by cyber‐world and leads to financial losses for
both industries and individuals. Detection of phishing attack with high accuracy has always …
both industries and individuals. Detection of phishing attack with high accuracy has always …