Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …
exploitations that employ a variety of attack vectors and strategies to psychologically …
Malware propagation in online social networks: nature, dynamics, and defense implications
Online social networks, which have been expanding at a blistering speed recently, have
emerged as a popular communication infrastructure for Internet users. Meanwhile, malware …
emerged as a popular communication infrastructure for Internet users. Meanwhile, malware …
[PDF][PDF] Measurement and classification of humans and bots in internet chat.
The abuse of chat services by automated programs, known as chat bots, poses a serious
threat to Internet users. Chat bots target popular chat networks to distribute spam and …
threat to Internet users. Chat bots target popular chat networks to distribute spam and …
Understanding instant messaging traffic characteristics
Instant messaging (IM) has become increasingly popular due to its quick response time, its
ease of use, and possibility of multitasking. It is estimated that there are several millions of …
ease of use, and possibility of multitasking. It is estimated that there are several millions of …
Humans and bots in internet chat: measurement, analysis, and automated classification
The abuse of chat services by automated programs, known as chat bots, poses a serious
threat to Internet users. Chat bots target popular chat networks to distribute spam and …
threat to Internet users. Chat bots target popular chat networks to distribute spam and …
Propagation of active worms: a survey
Y **ang, X Fan, W Zhu - 2009 - acquire.cqu.edu.au
This paper serves worm defenders' objective to improve their immunity to future active
worms by giving them a deep insight into propagation characteristics of active worms from a …
worms by giving them a deep insight into propagation characteristics of active worms from a …
Simulating non-scanning worms on peer-to-peer networks
G Chen, RS Gray - Proceedings of the 1st international conference on …, 2006 - dl.acm.org
Millions of Internet users are using large-scale peer-to-peer (P2P) networks to share content
files today. Many other mission-critical applications, such as Internet telephony and Domain …
files today. Many other mission-critical applications, such as Internet telephony and Domain …
A categorization framework for common computer vulnerabilities and exposures
Z Chen, Y Zhang, Z Chen - The Computer Journal, 2010 - academic.oup.com
The dictionary of common vulnerabilities and exposures (CVEs) is a compilation of known
security loopholes whose objective is to both facilitate the exchange of security-related …
security loopholes whose objective is to both facilitate the exchange of security-related …
Potent and stealthy control flow obfuscation by stack based self-modifying code
Software code released to the user has the risk of reverse engineering attacks. Software
obfuscation techniques can be employed to make the reverse engineering of software …
obfuscation techniques can be employed to make the reverse engineering of software …
HoneyIM: Fast detection and suppression of instant messaging malware in enterprise-like networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to
its popularity. Distinct from other malware, it is straightforward for IM malware to find and hit …
its popularity. Distinct from other malware, it is straightforward for IM malware to find and hit …