Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic literature review on phishing email detection using natural language processing techniques
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet
economy. Phishing attacks are now most often carried out by email. To better comprehend …
economy. Phishing attacks are now most often carried out by email. To better comprehend …
Phishing environments, techniques, and countermeasures: A survey
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …
web, mobile, and social networking technologies. Previous phishing taxonomies have …
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …
authentication on the web using a broad set of twenty-five usability, deployability and …
Phishing email detection using natural language processing techniques: a literature survey
Phishing is the most prevalent method of cybercrime that convinces people to provide
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …
Performance benchmarking for simulated phishing attacks
R Belani, A Higbee, S Greaux - US Patent 9,667,645, 2017 - Google Patents
G06F II/00(2006.01) H04L 29/06(2006.01) Described herein are methods, network devices
and (52) US Cl. machine-readable media for conducting a simulated phish CPC...... H04L …
and (52) US Cl. machine-readable media for conducting a simulated phish CPC...... H04L …
{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound
Two-factor authentication protects online accounts even if passwords are leaked. Most
users, however, prefer password-only authentication. One reason why twofactor …
users, however, prefer password-only authentication. One reason why twofactor …
SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
Internet users today depend daily on HTTPS for secure communication with sites they intend
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …
Suspicious message processing and incident response
A Higbee, R Belani, S Greaux, W Galway… - US Patent …, 2018 - Google Patents
US9906539B2 - Suspicious message processing and incident response - Google Patents
US9906539B2 - Suspicious message processing and incident response - Google Patents …
US9906539B2 - Suspicious message processing and incident response - Google Patents …
Web phishing detection using web crawling, cloud infrastructure and deep learning framework
The pandemic of COVID-19 obliges citizens to follow the “work from home “scheme. The
Internet is also a powerful channel for social connections. The huge dependency of people …
Internet is also a powerful channel for social connections. The huge dependency of people …
An analysis of phishing blacklists: Google safe browsing, openphish, and phishtank
Blacklists play a vital role in protecting internet users against phishing attacks. The
effectiveness of blacklists depends on their size, scope, update speed and frequency, and …
effectiveness of blacklists depends on their size, scope, update speed and frequency, and …