Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
A survey of phishing email filtering techniques
Phishing email is one of the major problems of today's Internet, resulting in financial losses
for organizations and annoying individual users. Numerous approaches have been …
for organizations and annoying individual users. Numerous approaches have been …
Detection of online phishing email using dynamic evolving neural network based on reinforcement learning
Despite state-of-the-art solutions to detect phishing attacks, there is still a lack of accuracy for
the detection systems in the online mode which is leading to loopholes in web-based …
the detection systems in the online mode which is leading to loopholes in web-based …
Toward a reliable anomaly-based intrusion detection in real-world environments
A popular approach for detecting network intrusion attempts is to monitor the network traffic
for anomalies. Extensive research effort has been invested in anomaly-based network …
for anomalies. Extensive research effort has been invested in anomaly-based network …
Phishing counter measures and their effectiveness–literature review
S Purkait - Information Management & Computer Security, 2012 - emerald.com
Phishing is essentially a social engineering crime on the Web, whose rampant occurrences
and technique advancements are posing big challenges for researchers in both academia …
and technique advancements are posing big challenges for researchers in both academia …
[KNIHA][B] Machine Learning for Computer and Cyber Security
BB Gupta, M Sheng - 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
Intelligent phishing detection and protection scheme for online transactions
Phishing is an instance of social engineering techniques used to deceive users into giving
their sensitive information using an illegitimate website that looks and feels exactly like the …
their sensitive information using an illegitimate website that looks and feels exactly like the …
Phishing classification techniques: A systematic literature review
Phishing has become a serious and concerning problem within the past 10 years, with many
reviews describing attack patterns and anticipating different method utilizations. This …
reviews describing attack patterns and anticipating different method utilizations. This …
Phishing email detection based on binary search feature selection
G Sonowal - SN Computer Science, 2020 - Springer
Phishing has appeared as a critical issue in the cybersecurity domain. Phishers adopt email
as one of their major channels of communication to lure potential victims. This paper …
as one of their major channels of communication to lure potential victims. This paper …
Do users focus on the correct cues to differentiate between phishing and genuine emails?
This paper examines the cues that typically differentiate phishing emails from genuine
emails. The research is conducted in two stages. In the first stage, we identify the cues that …
emails. The research is conducted in two stages. In the first stage, we identify the cues that …