Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Measuring the changing cost of cybercrime
R Anderson, C Barton, R Bölme, R Clayton, C Ganán… - 2019 - orca.cardiff.ac.uk
In 2012 we presented the rst systematic study of the costs of cybercrime. In this paper, we
report what has changed in the seven years since. The period has seen major platform …
report what has changed in the seven years since. The period has seen major platform …
A long way to the top: Significance, structure, and stability of internet top lists
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …
security rely on lists of target domains to be analysed; researchers make use of target lists …
Detecting phishing sites using chatgpt
The emergence of Large Language Models (LLMs), including ChatGPT, is having a
significant impact on a wide range of fields. While LLMs have been extensively researched …
significant impact on a wide range of fields. While LLMs have been extensively researched …
Needle in a haystack: Tracking down elite phishing domains in the wild
Today's phishing websites are constantly evolving to deceive users and evade the detection.
In this paper, we perform a measurement study on squatting phishing domains where the …
In this paper, we perform a measurement study on squatting phishing domains where the …
Hiding in plain sight: A longitudinal study of combosquatting abuse
Domain squatting is a common adversarial practice where attackers register domain names
that are purposefully similar to popular domains. In this work, we study a specific type of …
that are purposefully similar to popular domains. In this work, we study a specific type of …
Double and nothing: Understanding and detecting cryptocurrency giveaway scams
As cryptocurrencies increase in popularity and users obtain and manage their own assets,
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …
Internet-based social engineering psychology, attacks, and defenses: A survey
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …
serve as the first step in a sophisticated sequence of attacks that target, among other things …
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
In-browser cryptojacking is a form of resource abuse that leverages end-users' machines to
mine cryptocurrency without obtaining the users' consent. In this paper, we design …
mine cryptocurrency without obtaining the users' consent. In this paper, we design …
Plug and prey? measuring the commoditization of cybercrime via online anonymous markets
Researchers have observed the increasing commoditization of cybercrime, that is, the
offering of capabilities, services, and resources as commodities by specialized suppliers in …
offering of capabilities, services, and resources as commodities by specialized suppliers in …
BTG: A Bridge to Graph machine learning in telecommunications fraud detection
X Hu, H Chen, S Liu, H Jiang, G Chu, R Li - Future Generation Computer …, 2022 - Elsevier
Telecommunications fraud runs rampant recently around the world. Therefore, how to
effectively detect fraudsters has become an increasingly challenging problem. However …
effectively detect fraudsters has become an increasingly challenging problem. However …