Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of phishing attacks: Their types, vectors and technical approaches
Phishing was a threat in the cyber world a couple of decades ago and still is today. It has
grown and evolved over the years as phishers are getting creative in planning and …
grown and evolved over the years as phishers are getting creative in planning and …
A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy
The recent surge in phishing incidents in the post-COVID era poses a serious threat towards
the social and economic well-being of users. The escalation in dependency upon the …
the social and economic well-being of users. The escalation in dependency upon the …
When the User Is Inside the User Interface: An Empirical Study of {UI} Security Properties in Augmented Reality
Augmented reality (AR) experiences place users inside the user interface (UI), where they
can see and interact with three-dimensional virtual content. This paper explores UI security …
can see and interact with three-dimensional virtual content. This paper explores UI security …
Towards discovering and understanding task hijacking in android
Android multitasking provides rich features to enhance user experience and offers great
flexibility for app developers to promote app personalization. However, the security …
flexibility for app developers to promote app personalization. However, the security …
OAuch: Exploring security compliance in the OAuth 2.0 ecosystem
The OAuth 2.0 protocol is a popular and widely adopted authorization protocol. It has been
proven secure in a comprehensive formal security analysis, yet new vulnerabilities continue …
proven secure in a comprehensive formal security analysis, yet new vulnerabilities continue …
{TRIDENT}: Towards Detecting and Mitigating Web-based Social Engineering Attacks
As the weakest link in cybersecurity, humans have become the main target of attackers who
take advantage of sophisticated web-based social engineering techniques. These attackers …
take advantage of sophisticated web-based social engineering techniques. These attackers …
Adaptive intelligent learning approach based on visual anti-spam email model for multi-natural language
MA Mohammed, DA Ibrahim… - Journal of Intelligent …, 2021 - degruyter.com
Spam electronic mails (emails) refer to harmful and unwanted commercial emails sent to
corporate bodies or individuals to cause harm. Even though such mails are often used for …
corporate bodies or individuals to cause harm. Even though such mails are often used for …
Android ui deception revisited: Attacks and defenses
App-based deception attacks are increasingly a problem on mobile devices and they are
used to steal passwords, credit card numbers, text messages, etc. Current versions of …
used to steal passwords, credit card numbers, text messages, etc. Current versions of …
A tale of two headers: a formal analysis of inconsistent {Click-Jacking} protection on the web
Click-jacking protection on the modern Web is commonly enforced via client-side security
mechanisms for framing control, like the X-Frame-Options header (XFO) and Content …
mechanisms for framing control, like the X-Frame-Options header (XFO) and Content …
[HTML][HTML] An intelligent spam detection model based on artificial immune system
Spam emails, also known as non-self, are unsolicited commercial or malicious emails, sent
to affect either a single individual or a corporation or a group of people. Besides advertising …
to affect either a single individual or a corporation or a group of people. Besides advertising …