Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale
Despite an extensive anti-phishing ecosystem, phishing attacks continue to capitalize on
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …
gaps in detection to reach a significant volume of daily victims. In this paper, we isolate and …
Opening the blackbox of virustotal: Analyzing online phishing scan engines
Online scan engines such as VirusTotal are heavily used by researchers to label malicious
URLs and files. Unfortunately, it is not well understood how the labels are generated and …
URLs and files. Unfortunately, it is not well understood how the labels are generated and …
Comar: Classification of compromised versus maliciously registered domains
Miscreants abuse thousands of domain names every day by launching large-scale attacks
such as phishing or malware campaigns. While some domains are solely registered for …
such as phishing or malware campaigns. While some domains are solely registered for …
It's not what it looks like: Measuring attacks and defensive registrations of homograph domains
F Quinkert, T Lauinger, W Robertson… - … IEEE Conference on …, 2019 - ieeexplore.ieee.org
International Domain Names (IDNs) may contain Unicode in addition to ASCII characters.
This enables attackers to replace one or even more characters of a well-known domain with …
This enables attackers to replace one or even more characters of a well-known domain with …
[PDF][PDF] Cracking wall of confinement: Understanding and analyzing malicious domain takedowns
E Alowaisheq - The Network and Distributed System Security …, 2019 - par.nsf.gov
Take-down operations aim to disrupt cybercrime involving malicious domains. In the past
decade, many successful take-down operations have been reported, including those against …
decade, many successful take-down operations have been reported, including those against …
Are you human? resilience of phishing detection to evasion techniques based on human verification
Phishing is one of the most common cyberattacks these days. Attackers constantly look for
new techniques to make their campaigns more lucrative by extending the lifespan of …
new techniques to make their campaigns more lucrative by extending the lifespan of …
Panning for gold. eth: Understanding and Analyzing ENS Domain Dropcatching
Ethereum Name Service (ENS) domains allow users to map human-readable names (such
as gold. eth) to their cryptocurrency addresses, simplifying cryptocurrency transactions. Like …
as gold. eth) to their cryptocurrency addresses, simplifying cryptocurrency transactions. Like …
Unravelling ariadne's thread: Exploring the threats of decentralised dns
The current landscape of the core Internet technologies shows considerable centralisation
with the big tech companies controlling the vast majority of traffic and services. This situation …
with the big tech companies controlling the vast majority of traffic and services. This situation …
Stale TLS certificates: investigating precarious third-party access to valid TLS keys
Certificate authorities enable TLS server authentication by generating certificates that attest
to the map** between a domain name and a cryptographic keypair, for up to 398 days …
to the map** between a domain name and a cryptographic keypair, for up to 398 days …
A large scale study and classification of virustotal reports on phishing and malware urls
VirusTotal (VT) is a widely used scanning service for researchers and practitioners to label
malicious entities and predict new security threats. Unfortunately, it is little known to the end …
malicious entities and predict new security threats. Unfortunately, it is little known to the end …