In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approac...In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approach to embedding sophisticated phishing detection within a password manager’s framework, called PhishGuard. PhishGuard uses a Large Language Model (LLM), specifically a fine-tuned BERT algorithm that works in real time, where URLs fed by the user in the credentials are analyzed and authenticated. This approach enhances user security with its provision of real-time protection from phishing attempts. Through rigorous testing, this paper illustrates how PhishGuard has scored well in tests that measure accuracy, precision, recall, and false positive rates.展开更多
It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on l...It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on learners’communicative competence by conducting the method of systematic review.The findings implied that text-based CMC settings allowed learners to interact.The interaction provided learners with more opportunities to develop their communicative competence of target language.展开更多
The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communica...The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communication: computer-mediated communication (CMC). Text-based CMC is one of the most popular forms of CMC in which people send instant messages to others in different settings. Since this mode of interaction combines features of both the written and spoken language (Greenfield & Subrahmanyam, 2003), it's of great interest whether it follows the same sequential rule as the telephone conversation. However, compared to telephone conversations, computer-mediated communication has received much less attention, let alone text-based CMC. The existing body of literature mostly focuses on content analysis and linguistic features but neglects the sequential organization of such interaction (Paolillo, 1999; Greenfield and Subrahmanyam, 2003; Herring, 1999). In light of this, this paper examines the opening moves of instant message exchanges among Chinese adults in an attempt to find out the unique features characterizing the way they open an online chat. The framework that was chosen for data analysis was the sequential model proposed by Schegloff for American telephone openings.展开更多
Questions can be classified from different perspectives: grammatical form, communicative value, content orientation and cognitive level. In language pedagogy, text-based questioning as both an attention drawing devic...Questions can be classified from different perspectives: grammatical form, communicative value, content orientation and cognitive level. In language pedagogy, text-based questioning as both an attention drawing device and a form of learning tasks serves text instruction. Therefore, language teachers preparing text-based questioning should take into consideration all dimensions of questions, especially cognitive requirement and communicative character. In addition, interaction between learner, text and the world can be achieved by the adoption of both about-the-text and beyond-the-text questions in teachers' text-based question construction.展开更多
Recently,with the spread of online services involving websites,attack-ers have the opportunity to expose these services to malicious actions.To protect these services,A Completely Automated Public Turing Test to Tell ...Recently,with the spread of online services involving websites,attack-ers have the opportunity to expose these services to malicious actions.To protect these services,A Completely Automated Public Turing Test to Tell Computers and Humans Apart(CAPTCHA)is a proposed technique.Since many Arabic countries have developed their online services in Arabic,Arabic text-based CAPTCHA has been introduced to improve the usability for their users.More-over,there exist a visual cryptography(VC)technique which can be exploited in order to enhance the security of text-based CAPTCHA by encrypting a CAPTCHA image into two shares and decrypting it by asking the user to stack them on each other.However,as yet,the implementation of this technique with regard to Arabic text-based CAPTCHA has not been carried out.Therefore,this paper aims to implement an Arabic printed and handwritten text-based CAPTCHA scheme based on the VC technique.To evaluate this scheme,experi-mental studies are conducted,and the results show that the implemented scheme offers a reasonable security and usability levels with text-based CAPTCHA itself.展开更多
基于口令的认证是常见的身份认证机制。然而,大规模口令泄露事件时有发生,表明口令仍面临着被猜测或者盗用等风险。由于口令可以被视作一种特殊的自然语言,近年来运用自然语言处理技术进行口令分析的研究工作逐渐展开。目前少有工作在...基于口令的认证是常见的身份认证机制。然而,大规模口令泄露事件时有发生,表明口令仍面临着被猜测或者盗用等风险。由于口令可以被视作一种特殊的自然语言,近年来运用自然语言处理技术进行口令分析的研究工作逐渐展开。目前少有工作在大语言模型(LLM,large language model)上探究口令文本分词粒度对口令分析效果的影响。为此,提出了基于LLM的多粒度口令分析框架,总体上沿用预训练范式,在大量未标记数据集上自主学习口令分布先验知识。该框架由同步网络、主干网络、尾部网络3个模块构成。其中,同步网络模块实现了char-level、template-level和chunk-level这3种粒度的口令分词,并提取了口令的字符分布、结构、词块组成等特征知识;主干网络模块构建了通用的口令模型来学习口令组成规律;尾部网络模块生成了候选口令对目标库进行猜测分析。在Tianya、Twitter等8个口令库上进行大量实验,分析总结了多粒度分词下所提框架在不同语言环境中的口令分析效果。实验结果表明,在中文用户场景中,基于char-level和chunk-level分词的框架口令分析性能接近一致,且显著优于基于template-level分词的框架;在英文用户场景中,基于chunk-level分词的框架口令分析性能最佳。展开更多
文摘In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approach to embedding sophisticated phishing detection within a password manager’s framework, called PhishGuard. PhishGuard uses a Large Language Model (LLM), specifically a fine-tuned BERT algorithm that works in real time, where URLs fed by the user in the credentials are analyzed and authenticated. This approach enhances user security with its provision of real-time protection from phishing attempts. Through rigorous testing, this paper illustrates how PhishGuard has scored well in tests that measure accuracy, precision, recall, and false positive rates.
文摘It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on learners’communicative competence by conducting the method of systematic review.The findings implied that text-based CMC settings allowed learners to interact.The interaction provided learners with more opportunities to develop their communicative competence of target language.
文摘The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communication: computer-mediated communication (CMC). Text-based CMC is one of the most popular forms of CMC in which people send instant messages to others in different settings. Since this mode of interaction combines features of both the written and spoken language (Greenfield & Subrahmanyam, 2003), it's of great interest whether it follows the same sequential rule as the telephone conversation. However, compared to telephone conversations, computer-mediated communication has received much less attention, let alone text-based CMC. The existing body of literature mostly focuses on content analysis and linguistic features but neglects the sequential organization of such interaction (Paolillo, 1999; Greenfield and Subrahmanyam, 2003; Herring, 1999). In light of this, this paper examines the opening moves of instant message exchanges among Chinese adults in an attempt to find out the unique features characterizing the way they open an online chat. The framework that was chosen for data analysis was the sequential model proposed by Schegloff for American telephone openings.
文摘Questions can be classified from different perspectives: grammatical form, communicative value, content orientation and cognitive level. In language pedagogy, text-based questioning as both an attention drawing device and a form of learning tasks serves text instruction. Therefore, language teachers preparing text-based questioning should take into consideration all dimensions of questions, especially cognitive requirement and communicative character. In addition, interaction between learner, text and the world can be achieved by the adoption of both about-the-text and beyond-the-text questions in teachers' text-based question construction.
文摘Recently,with the spread of online services involving websites,attack-ers have the opportunity to expose these services to malicious actions.To protect these services,A Completely Automated Public Turing Test to Tell Computers and Humans Apart(CAPTCHA)is a proposed technique.Since many Arabic countries have developed their online services in Arabic,Arabic text-based CAPTCHA has been introduced to improve the usability for their users.More-over,there exist a visual cryptography(VC)technique which can be exploited in order to enhance the security of text-based CAPTCHA by encrypting a CAPTCHA image into two shares and decrypting it by asking the user to stack them on each other.However,as yet,the implementation of this technique with regard to Arabic text-based CAPTCHA has not been carried out.Therefore,this paper aims to implement an Arabic printed and handwritten text-based CAPTCHA scheme based on the VC technique.To evaluate this scheme,experi-mental studies are conducted,and the results show that the implemented scheme offers a reasonable security and usability levels with text-based CAPTCHA itself.
文摘基于口令的认证是常见的身份认证机制。然而,大规模口令泄露事件时有发生,表明口令仍面临着被猜测或者盗用等风险。由于口令可以被视作一种特殊的自然语言,近年来运用自然语言处理技术进行口令分析的研究工作逐渐展开。目前少有工作在大语言模型(LLM,large language model)上探究口令文本分词粒度对口令分析效果的影响。为此,提出了基于LLM的多粒度口令分析框架,总体上沿用预训练范式,在大量未标记数据集上自主学习口令分布先验知识。该框架由同步网络、主干网络、尾部网络3个模块构成。其中,同步网络模块实现了char-level、template-level和chunk-level这3种粒度的口令分词,并提取了口令的字符分布、结构、词块组成等特征知识;主干网络模块构建了通用的口令模型来学习口令组成规律;尾部网络模块生成了候选口令对目标库进行猜测分析。在Tianya、Twitter等8个口令库上进行大量实验,分析总结了多粒度分词下所提框架在不同语言环境中的口令分析效果。实验结果表明,在中文用户场景中,基于char-level和chunk-level分词的框架口令分析性能接近一致,且显著优于基于template-level分词的框架;在英文用户场景中,基于chunk-level分词的框架口令分析性能最佳。