Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A critical appraisal of contemporary cyber security social engineering solutions: Measures, policies, tools and applications
HA Aldawood, G Skinner - 2018 26th International Conference …, 2018 - ieeexplore.ieee.org
Social engineering is one of the biggest threats organizations face today, as more and more
companies are adopting digitalization. This study presents a critical review of the existing …
companies are adopting digitalization. This study presents a critical review of the existing …
Decentralized privacy: a distributed ledger approach
Our world due to the technological progress became fast-paced and is constantly evolving,
thus changing every single day. Consequently, the most valuable asset on earth is not gold …
thus changing every single day. Consequently, the most valuable asset on earth is not gold …
Mmsphid: a phoneme based phishing verification model for persons with visual impairments
G Sonowal, KS Kuppusamy - Information & Computer Security, 2018 - emerald.com
MMSPhiD: a phoneme based phishing verification model for persons with visual impairments |
Emerald Insight Books and journals Case studies Expert Briefings Open Access Publish with …
Emerald Insight Books and journals Case studies Expert Briefings Open Access Publish with …
Typowriter: A tool to prevent typosquatting
Typosquatting is a form of internet cybersquatting generated from the mistakes (typos) made
by internet users while ty** a website address. It often leads the user to another …
by internet users while ty** a website address. It often leads the user to another …
Catchphish: model for detecting homographic attacks on phishing pages
LC Teixeira, JCG De Barros… - … Joint Conference on …, 2022 - ieeexplore.ieee.org
The growth in the numbers of phishing attacks, along with the volume of successful frauds,
demonstrates vul-nerabilities of the protection tools and exposes the advance in the …
demonstrates vul-nerabilities of the protection tools and exposes the advance in the …
Automating domain squatting detection using representation learning
P Loyola, K Gajananan, H Kitahara… - … Conference on Big …, 2020 - ieeexplore.ieee.org
Registering altered domain names with the purpose of confusing users and conducting
malicious activities is one of the most widespread types of attacks on the Web, conforming a …
malicious activities is one of the most widespread types of attacks on the Web, conforming a …
Domain name processing systems and methods
H Nguyen, A Mesdaq, K Dedon, M Fox… - US Patent …, 2020 - Google Patents
Disclosed is a domain filter capable of determining an n-gram distance between a seed
domain and each of a plurality of candidate domains. The domain filter loads a seed domain …
domain and each of a plurality of candidate domains. The domain filter loads a seed domain …
Fast and accurate typosquatting domains evaluation with siamese networks
J Ya, T Liu, Q Li, P Lv, J Shi… - MILCOM 2018-2018 IEEE …, 2018 - ieeexplore.ieee.org
Typosquatting is a form of cybersquatting, which is a practice of registering typosquatting
domain names that closely resemble legitimate and popular ones. It has become a serious …
domain names that closely resemble legitimate and popular ones. It has become a serious …
[PDF][PDF] Detecting cybersquatting-based business email compromise
DJ Griffiths - 2022 - researchgate.net
Business email compromise (BEC) is a subset of phishing attacks that target employees of
organizations and uses social engineering techniques to convince victims that the emails …
organizations and uses social engineering techniques to convince victims that the emails …
Uma avaliação de comportamentos homográficos em ataques de phishing direcionados que exploram a suscetibilidade pela fidedignidade e sazonalidade
O avanço de ataques de phishing não se caracteriza apenas na propagação, mas também
no rigor em detalhes, tornando a fraude cada vez mais convincente ao crivo do usuário …
no rigor em detalhes, tornando a fraude cada vez mais convincente ao crivo do usuário …