Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A systematic review on deep-learning-based phishing email detection
Phishing attacks are a growing concern for individuals and organizations alike, with the
potential to cause significant financial and reputational damage. Traditional methods for …
potential to cause significant financial and reputational damage. Traditional methods for …
Machine learning in cybersecurity: a comprehensive survey
Today's world is highly network interconnected owing to the pervasiveness of small personal
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …
Defending against phishing attacks: taxonomy of methods, current issues and future directions
Internet technology is so pervasive today, for example, from online social networking to
online banking, it has made people's lives more comfortable. Due the growth of Internet …
online banking, it has made people's lives more comfortable. Due the growth of Internet …
Fighting against phishing attacks: state of the art and future challenges
In the last few years, phishing scams have rapidly grown posing huge threat to global
Internet security. Today, phishing attack is one of the most common and serious threats over …
Internet security. Today, phishing attack is one of the most common and serious threats over …
Phishing detection: analysis of visual similarity based approaches
AK Jain, BB Gupta - Security and Communication Networks, 2017 - Wiley Online Library
Phishing is one of the major problems faced by cyber‐world and leads to financial losses for
both industries and individuals. Detection of phishing attack with high accuracy has always …
both industries and individuals. Detection of phishing attack with high accuracy has always …
A survey of phishing email filtering techniques
Phishing email is one of the major problems of today's Internet, resulting in financial losses
for organizations and annoying individual users. Numerous approaches have been …
for organizations and annoying individual users. Numerous approaches have been …
A novel approach to protect against phishing attacks at client side using auto-updated white-list
AK Jain, BB Gupta - EURASIP Journal on Information Security, 2016 - Springer
Most of the anti-phishing solutions are having two major limitations; the first is the need of a
fast access time for a real-time environment and the second is the need of high detection …
fast access time for a real-time environment and the second is the need of high detection …
PHISH-SAFE: URL features-based phishing detection system using machine learning
AK Jain, BB Gupta - Cyber Security: Proceedings of CSI 2015, 2018 - Springer
Today, phishing is one of the most serious cyber-security threat in which attackers steal
sensitive information such as personal identification number (PIN), credit card details, login …
sensitive information such as personal identification number (PIN), credit card details, login …
A recent review of conventional vs. automated cybersecurity anti-phishing techniques
In the era of electronic and mobile commerce, massive numbers of financial transactions are
conducted online on daily basis, which created potential fraudulent opportunities. A common …
conducted online on daily basis, which created potential fraudulent opportunities. A common …
[HTML][HTML] Cyber resilience in firms, organizations and societies
K Hausken - Internet of Things, 2020 - Elsevier
Cyber resilience involves most societal actors, ie organizations, individuals, threat actors,
governments, insurers, etc., at most levels of organization. Actors are embedded within each …
governments, insurers, etc., at most levels of organization. Actors are embedded within each …