Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on malicious domains detection through DNS data analysis
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …
A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy
The recent surge in phishing incidents in the post-COVID era poses a serious threat towards
the social and economic well-being of users. The escalation in dependency upon the …
the social and economic well-being of users. The escalation in dependency upon the …
Accurate and fast URL phishing detector: a convolutional neural network approach
Along with the development of the Internet, methods of fraud and ways to obtain important
data such as logins and passwords or personal sensitive data have evolved. One way of …
data such as logins and passwords or personal sensitive data have evolved. One way of …
Measuring and modeling the label dynamics of online {Anti-Malware} engines
VirusTotal provides malware labels from a large set of anti-malware engines, and is heavily
used by researchers for malware annotation and system evaluation. Since different engines …
used by researchers for malware annotation and system evaluation. Since different engines …
Detecting phishing sites using chatgpt
The emergence of Large Language Models (LLMs), including ChatGPT, is having a
significant impact on a wide range of fields. While LLMs have been extensively researched …
significant impact on a wide range of fields. While LLMs have been extensively researched …
Needle in a haystack: Tracking down elite phishing domains in the wild
Today's phishing websites are constantly evolving to deceive users and evade the detection.
In this paper, we perform a measurement study on squatting phishing domains where the …
In this paper, we perform a measurement study on squatting phishing domains where the …
Hiding in plain sight: A longitudinal study of combosquatting abuse
Domain squatting is a common adversarial practice where attackers register domain names
that are purposefully similar to popular domains. In this work, we study a specific type of …
that are purposefully similar to popular domains. In this work, we study a specific type of …
[PDF][PDF] Seven months' worth of mistakes: A longitudinal study of typosquatting abuse
Typosquatting is the act of purposefully registering a domain name that is a mistype of a
popular domain name. It is a concept that has been known and studied for over 15 years, yet …
popular domain name. It is a concept that has been known and studied for over 15 years, yet …
Domain name system security and privacy: A contemporary survey
Abstract The Domain Name System (DNS) is one of the most important components of
today's Internet, and is the standard naming convention between human-readable domain …
today's Internet, and is the standard naming convention between human-readable domain …
Investigating package related security threats in software registries
Package registries host reusable code assets, allowing developers to share and reuse
packages easily, thus accelerating the software development process. Current software …
packages easily, thus accelerating the software development process. Current software …