Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Fighting against phishing attacks: state of the art and future challenges
BB Gupta, A Tewari, AK Jain, DP Agrawal - Neural Computing and …, 2017 - Springer
In the last few years, phishing scams have rapidly grown posing huge threat to global
Internet security. Today, phishing attack is one of the most common and serious threats over …
Internet security. Today, phishing attack is one of the most common and serious threats over …
SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
Phishing website detection with semantic features based on machine learning classifiers: a comparative study
The phishing attack is one of the main cybersecurity threats in web phishing and spear
phishing. Phishing websites continue to be a problem. One of the main contributions to our …
phishing. Phishing websites continue to be a problem. One of the main contributions to our …
Detection of phishing websites using an efficient feature-based machine learning framework
Phishing is a cyber-attack which targets naive online users tricking into revealing sensitive
information such as username, password, social security number or credit card number etc …
information such as username, password, social security number or credit card number etc …
New rule-based phishing detection method
In this paper, we present a new rule-based method to detect phishing attacks in internet
banking. Our rule-based method used two novel feature sets, which have been proposed to …
banking. Our rule-based method used two novel feature sets, which have been proposed to …
A survey of phishing email filtering techniques
Phishing email is one of the major problems of today's Internet, resulting in financial losses
for organizations and annoying individual users. Numerous approaches have been …
for organizations and annoying individual users. Numerous approaches have been …
Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors
The current study identified the antecedents of being an Internet scam victim and how it
impacts online privacy concerns and privacy protection behaviors. Structural equation …
impacts online privacy concerns and privacy protection behaviors. Structural equation …
Phishing website detection based on deep convolutional neural network and random forest ensemble learning
R Yang, K Zheng, B Wu, C Wu, X Wang - Sensors, 2021 - mdpi.com
Phishing has become one of the biggest and most effective cyber threats, causing hundreds
of millions of dollars in losses and millions of data breaches every year. Currently, anti …
of millions of dollars in losses and millions of data breaches every year. Currently, anti …
Classification of phishing email using random forest machine learning technique
AA Akinyelu, AO Adewumi - Journal of Applied Mathematics, 2014 - Wiley Online Library
Phishing is one of the major challenges faced by the world of e‐commerce today. Thanks to
phishing attacks, billions of dollars have been lost by many companies and individuals. In …
phishing attacks, billions of dollars have been lost by many companies and individuals. In …
D-fence: A flexible, efficient, and comprehensive phishing email detection system
Phishing continues to be a major security concern for organizations around the globe. Past
works proposed classifiers to detect phishing emails; however many of them are based on …
works proposed classifiers to detect phishing emails; however many of them are based on …