final_thesis_report_merged
final_thesis_report_merged
Project Report
on
BACHELOR OF ENGINEERING
in
INFORMATION TECHNOLOGY
Submitted by
SUPERVISOR
G. Srikanth
Assistant Professor,IT
Kokapet(V),Gandipet(M),Hyderabad-500075
Website:www.cbit.ac.in
2024-2025
DECLARATION
We, hereby declare that the thesis Deep Learning Based Phishing De-
tection System using URLs and Website Content is original and has
been carried out by us under the supervision of Mr G. Srikanth, CBIT,
Hyderabad for the Degree of B.E in INFORMATION TECHNOL-
OGY and the Project/Dissertation/Thesis checked in Anti-plagiarism Software
(Turnitin) which is having 24% similarity. If anything found guilty/copied from
other sources we are the sole responsible for the same and we abide by any
action taken by the Institute authorities. (As per the Institute guidelines the
Supervisor also held responsible for any manipulation by the Student).
Place: Hyderabad
Date: 19/04/2025
Supervisor Signature:
Name: Mr. G. Srikanth, Assistant Professor, Dept of IT, CBIT
CERTIFICATE
This is to certify that the project work (Part-II) entitled DEEP LEARNING
BASED PHISHING DETECTION SYSTEM USING URLS AND
We also thank all the staff members of the Information Technology depart-
ment for their valuable support and generous advice. Finally, thanks to all
our friends and family members for their continuous support and enthusiastic
help.
ii
Table of Contents
iii
CHAPTER 3 SYSTEM REQUIREMENT SPECIFICATION . 20
3.1 Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . 20
3.2 Non-Functional Requirements . . . . . . . . . . . . . . . . . . . . . 22
3.3 Software Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.4 Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . 25
CHAPTER 4 PROPOSED METHODOLOGY . . . . . . . . . . . . 27
CHAPTER 5 RESULTS . . . . . . . . . . . . . . . . . . . . . . . . . . 33
5.1 Model Evaluation and Performance Analysis . . . . . . . . . . . . 33
5.1.1 Key Observations . . . . . . . . . . . . . . . . . . . . . . . . 34
5.1.2 Execution Results of Phishing Website Detection System . 40
CHAPTER 6 CONCLUSION . . . . . . . . . . . . . . . . . . . . . . 43
CHAPTER 7 Future Scope . . . . . . . . . . . . . . . . . . . . . . . . 46
List of Tables
v
List of Figures
vi
Abbreviations
Abbreviation Description
IT Information Technology
ML Machine Learning
AI Artificial Intelligence
IP Internet Protocol
1
websites. Features like HTTPS, AnchorURL, Domain Registration Length,
and WebsiteTraffic emerged as key indicators. Phishing websites typically lack
secure connections, contain suspicious anchor links, and have recently regis-
tered domains or receive minimal web traffic, all of which can be quantified
and utilized by machine learning algorithms. To evaluate the effectiveness of
ML algorithms, a comparative study was conducted using multiple classifiers.
These include Gradient Boosting, CatBoost, Random Forest, Support Vec-
tor Machine (SVM), Multi-layer Perceptron (MLP), Decision Tree, K-Nearest
Neighbors (KNN), Logistic Regression, and Naı̈ve Bayes. Each of these clas-
sifiers has its own strengths: Random Forest and CatBoost excel in handling
large feature sets and dealing with non-linear data; SVM is effective in high-
dimensional spaces; MLP represents a deep learning-based neural network
approach; and Logistic Regression offers interpretability in linear classification
tasks. Naı̈ve Bayes, while simple and computationally efficient, often struggles
with datasets where features are not truly independent, which is the case
here. Performance metrics such as accuracy, precision, recall, and F1-score
were used to assess model performance. Results indicated that ensemble-based
methods like CatBoost and Random Forest achieved the highest accuracy,
with strong generalization across both training and test datasets. Models were
tuned using techniques like hyperparameter optimization and cross-validation
to improve robustness and prevent overfitting. This study highlights the critical
role of feature selection and model tuning in phishing detection. By identify-
ing which features contribute most significantly to classification accuracy and
tailoring models to the problem domain, detection rates can be significantly
improved. The insights gained from this research can inform the development
of real-time phishing detection tools integrated into browsers, email filters, and
cybersecurity infrastructure.
1.4 Objectives
1. To Analyze and Understand the Phishing Detection Problem:
Investigate the nature of phishing websites and identify key features
that distinguish them from legitimate websites using Exploratory Data
Analysis (EDA).
Overview
This paper introduces DEPHIDES, a deep learning-based system for
detecting phishing attacks. The research addresses the increasing threat of
phishing in the digital era, where cybercriminals exploit the anonymity of the
internet to steal sensitive information such as passwords, banking credentials,
and social security numbers.
Method
The researchers proposed a phishing detection system based on five deep
learning algorithms:
• Bidirectional RNNs
• Attention Networks
The system focuses on the rapid classification of web pages based on their
URLs. An extensive dataset of approximately five million labeled URLs
was created to evaluate model performance.
8
Results
Among the five deep learning models, Convolutional Neural Networks
(CNN) outperformed others with a phishing detection accuracy of 98.74%.
This result showcases CNN’s strength in recognizing phishing patterns from
URL-based features.
Conclusion
The study concludes that deep learning algorithms, particularly CNNs,
are highly effective for detecting phishing threats. The use of a large-scale
dataset and advanced neural network architectures contributes significantly to
the domain of automated phishing detection in cybersecurity.
Method
The research employed a phishing URL-based dataset from a well-known
repository, comprising over 11,000 websites with both phishing and legitimate
URL attributes in vector form. After preprocessing, the study implemented
several machine learning algorithms:
The hybrid model utilized both soft and hard voting techniques. Additionally,
canopy feature selection, cross-fold validation, and Grid Search Hyperparameter
Optimization were applied to enhance performance.
Results
Performance was assessed using metrics such as precision, accuracy, re-
call, F1-score, and specificity. The hybrid LSD model demonstrated superior
performance over the individual algorithms in accurately identifying phishing
URLs.
Conclusion
The hybrid machine learning approach, particularly the LSD model, shows
strong potential for phishing detection. The results underline the effectiveness
of combining multiple classifiers to enhance detection accuracy and reliability
in identifying phishing threats.
Overview
This research addresses the limitations of traditional blacklist-based phishing
detection techniques, which often fail to detect the vast and constantly evolving
phishing websites. The authors propose an enhanced deep learning-based
detection mechanism that integrates variational autoencoders (VAE) with
deep neural networks (DNN) for improved accuracy and efficiency.
Method
The framework utilizes VAE to automatically extract essential features from
raw URLs by reconstructing them. This automatic feature learning enhances
phishing detection performance. The dataset used for experimentation consisted
of approximately 100,000 URLs collected from:
• ISCX-URL-2016 dataset
Results
The proposed VAE-DNN model achieved a maximum detection accuracy of
97.45% and demonstrated a rapid response time of just 1.9 seconds. These
results surpassed those of all other tested models in the study.
Conclusion
The integration of variational autoencoders with deep neural networks
proves to be an effective solution for phishing URL detection. The approach
eliminates the need for manual feature engineering while offering both high
accuracy and fast execution, making it ideal for real-world deployment in
cybersecurity systems.
Overview
This study addresses critical internet security issues, with a specific focus
on phishing attacks that impersonate legitimate websites to steal personal
information. The researchers propose and compare three deep learning-based
approaches for effectively detecting phishing websites using URL features.
Method
The paper explores and evaluates the following deep learning techniques:
Each method was tested for its performance in classifying URLs as either
phishing or legitimate.
Results
The models achieved the following accuracy scores:
• CNN: 99.2%
• LSTM: 96.8%
Among these, the CNN model performed the best in terms of accuracy and
detection capabilities.
Overview
This paper highlights the increasing danger of phishing attacks as a major
form of social engineering targeting internet users, governments, and businesses.
It emphasizes phishing emails as the primary and most successful attack vector
in these scenarios.
Method
The researchers proposed a phishing detection model based on machine
learning techniques. The dataset was divided into training and testing sets,
and the model used email text features and additional attributes to classify
emails as phishing or non-phishing. Three different datasets were utilized for
experimentation, each containing varying feature sets to assess performance
impacts.
Results
Among the machine learning models tested, the boosted decision tree
algorithm achieved the best results, with accuracy rates of:
• 0.88
• 1.00
These were obtained across the three different datasets. The study found that
incorporating more features generally led to improved classification accuracy
and system efficiency.
Conclusion
The research confirms the potential of machine learning, especially boosted
decision trees, in detecting phishing emails with high accuracy. It also under-
scores the role of thorough feature selection in enhancing detection performance,
making the model suitable for practical cybersecurity applications.
Overview
This paper addresses the challenge of phishing detection through URL
analysis, with a particular focus on login URLs. The researchers note that
most existing solutions fail to include legitimate login forms in their legitimate
class examples, which limits their real-world applicability.
Method
The researchers compared machine learning and deep learning techniques for
detecting phishing websites through URL analysis. Unlike typical approaches,
they used URLs from login pages in both phishing and legitimate classes to
create a more representative real-world scenario. The researchers also tested
how models trained on older datasets performed when tested with recent URLs
to measure accuracy degradation over time. They introduced a new dataset
named Phishing Index Login URL (PILU-90K), containing 60,000 legitimate
URLs (including index and login websites) and up to 30,000 phishing URLs.
Conclusion
2.6 Paper 6 Phishing URL detection: A real-case scenario through login
URLs Manuel Sánchez Paniagua, Eduardo Fidalgo, Enrique Alegre, Al-Nabki
Mhd Wesam - January 2022
This paper addresses the challenge of phishing detection through URL
analysis, with a particular focus on login URLs. The researchers note that
most existing solutions fail to include legitimate login forms in their legitimate
class examples, which limits their real-world applicability.
Method The researchers compared machine learning and deep learning
techniques for detecting phishing websites through URL analysis. Unlike
typical approaches, they used URLs from login pages in both phishing and
legitimate classes to create a more representative real-world scenario. The
researchers also tested how models trained on older datasets performed when
tested with recent URLs to measure accuracy degradation over time. They
introduced a new dataset named Phishing Index Login URL (PILU-90K),
containing 60,000 legitimate URLs (including index and login websites) and
so far upto 30,000 phishing URLs.
Conclusion This research highlights the importance of using representative
training data that includes legitimate login URLs to build more effective phish-
ing detection systems. The demonstrated approach using Logistic Regression
with TF-IDF features provides a promising solution for real-world phishing
detection scenarios.
Overview
This paper focuses on the growing need for digital security amidst the rise
of phishing attacks, which are a prominent form of social engineering used to
compromise user credentials. The study proposes an intrusion detection system
implemented as a Chrome extension to address phishing threats in real-time.
Method
The authors developed a lightweight and proactive rule-based incremental
construction approach for detecting phishing URLs. This technique analyzes
various URL features including domain information, content patterns, and
page-level attributes. It is designed to be robust, reliable, and scalable, and
does not depend on existing blacklist signatures—enabling effective detection
of zero-day and spear phishing attacks.
Results
The proposed system achieved:
Overview
This study addresses the inherent limitations of traditional blacklist-based
phishing detection techniques, which often fail to identify newly generated
phishing URLs. The paper proposes an alternative deep learning approach to
enhance the universality and effectiveness of phishing URL detection systems.
Method
The researchers evaluated three different feature types for phishing URL
detection:
• Lexical features
• Character-level embeddings
• Word-level embeddings
They designed a new deep neural network architecture that combines multiple
CNN and LSTM layers, tailored to capture both local and sequential patterns
in URLs.
Results
The most effective model combined character-level and word-level embed-
dings, achieving an accuracy of 94.4% in phishing URL detection. The hybrid
Conclusion
The findings highlight that using a combination of feature types signifi-
cantly enhances phishing detection performance. The proposed deep learning
architecture demonstrates a robust ability to detect phishing URLs, even those
not present in existing blacklists, offering a substantial improvement over
conventional methods.
Overview
This research highlights key limitations in existing anti-phishing solutions,
such as low detection rates and slow response times in real-time scenarios.
While blacklist methods are fast, their detection effectiveness is limited. As an
alternative, the paper proposes an automated whitelist-based phishing detection
approach.
Method
The proposed method involves analyzing similarities between visual and
actual hyperlinks. The system compares domain names to trusted domains in
a whitelist, maps them to corresponding IP addresses, and uses extracted URL
information to make detection decisions. Six diverse datasets were employed
to test the effectiveness of the system.
Results
The approach achieved strong results, particularly with smaller datasets. On
average, it attained a 96.17% accuracy and a 95.0% true positive rate across six
experiments. Although accuracy varied across datasets, the method consistently
Conclusion
This research highlights the importance of using representative training
data that includes legitimate login URLs to build more effective phishing
detection systems. The demonstrated approach using Logistic Regression with
TF-IDF features provides a promising solution for real-world phishing detection
scenarios.
Furthermore, the study introduces an automated whitelist-based detection
system as a robust and efficient alternative to traditional blacklist and heuristic-
based approaches. By dynamically maintaining and referencing a set of
verified legitimate login URLs, the system significantly enhances the accuracy
of phishing detection while minimizing false positives, a common limitation
in existing models. One of the key advantages of this approach lies in
its ability to handle real-time URL classification with reduced computational
overhead, making it highly suitable for deployment in large-scale, latency-
sensitive environments such as web browsers, email clients, and enterprise
security gateways.
The system’s architecture allows for continuous updates and adaptive learn-
ing, enabling it to respond quickly to emerging phishing threats without
requiring frequent retraining on large datasets. This real-time adaptability en-
sures that users remain protected against the ever-evolving landscape of cyber
threats, where phishing techniques are becoming increasingly sophisticated.
Moreover, by focusing on login pages—one of the primary targets in phish-
ing attacks—the proposed method directly addresses the most critical entry
point exploited by attackers. In summary, the integration of whitelist-based
filtering with machine learning models creates a powerful hybrid framework
that offers scalability, efficiency, and high detection performance. It sets a
strong foundation for future advancements in intelligent phishing detection
systems and paves the way for safer and more secure web interactions.
• The system shall provide a simple and intuitive web interface for
users to input website URLs for analysis.
2. Input Validation
• The system shall validate user inputs to ensure that only properly
formatted URLs are accepted.
3. Feature Extraction
• Length of URL
• Use of HTTPS
• Presence of prefix/suffix
20
• Use of ’@’ or ’-’
These features shall be used as input for the trained machine learning
model.
4. Phishing Detection
• This log may be used for further model training and auditing
purposes.
8. Error Handling
9. Security
1. Performance
• The system shall respond to user queries within 2–5 seconds under
normal operating conditions.
2. Scalability
• Tooltips, help text, and alert messages shall be provided for better
user guidance.
4. Maintainability
5. Reliability
6. Availability
• The system shall be available for use at least 99% of the time,
barring planned maintenance or unexpected downtimes.
7. Portability
9. Data Privacy
• The system shall not store personally identifiable user data unless
necessary.
10. Extensibility
• Any OS compatible with Python and supporting Flask for web app
development.
2. Programming Language:
5. Flask Framework:
6. IDE/Development Tools:
• Minimum: 4 GB
3. Storage:
5. Internet Connection:
27
Once the data is preprocessed, Exploratory Data Analysis (EDA) is con-
ducted. EDA serves as a vital step to understand the underlying patterns and
trends in the data. It includes:
• Histograms and box plots to understand the spread and detect outliers.
These visual tools help identify informative features and guide feature
selection, which plays a crucial role in model performance. To understand the
significance of various features in phishing website detection, an exploratory
data analysis (EDA) was conducted. A heatmap was generated to visualize
the correlation between different features and the target class (phishing or
legitimate websites).
• Testing Set (20%): Held back and used to evaluate the model’s perfor-
mance after training.
To further explore the dataset, a pair plot analysis was conducted, focusing
on key features such as ‘PrefixSuffix-’, ‘SubDomains’, ‘HTTPS’, ‘AnchorURL’,
and ‘WebsiteTraffic’.
Each model is trained on the training dataset and evaluated using key
performance metrics:
By analyzing these values, we can assess where the model makes mistakes
and how those mistakes might impact real-world performance.
Among the many models tested, the Gradient Boosting Classifier achieved
the highest performance, boasting an accuracy of 97.4%. Such a high level of
precision in identifying phishing websites demonstrates the model’s utility.
Among all the models, the Gradient Boosting Classifier demonstrated the
highest overall performance with an accuracy of 97.4%, F1-score of 0.974,
recall of 0.988, and precision of 0.989. The confusion matrix for this model is
shown below:
Table 5.2: Confusion Matrix for Gradient Boosting Classifier
33
• It produced 43 false positives and only 14 false negatives, reflecting its
strong predictive capability.
This balance is ideal for real-world classification tasks where both types of
errors are costly. In short, GBC succeeds due to its adaptability, optimization
strategy, and robustness.
• Pros: High precision (0.991) and recall (0.990) demonstrate that Cat-
Boost is highly capable of classifying both classes accurately.
Figure 5.2: CatBoost Classifier showing feature handling and boosting process.
SVM attempts to find the optimal hyperplane that maximizes the margin
between two classes. It yielded good results with an F1-score of 0.968 and
recall of 0.980:
• Why It Didn’t Top the List: The complexity of the data might have
required a non-linear kernel, and even then, SVM lacks the ensemble
power to correct its own mistakes as boosting does.
• Why It Lagged: Although KNN showed high recall (0.991), its lower
accuracy suggests that it misclassified some instances due to proximity
ambiguity. It doesn’t learn any internal model, making it ill-suited for
high-dimensional or complex data.
Naive Bayes applies Bayes’ theorem with a strong (naive) assumption that
features are independent:
The Gradient Boosting Classifier emerged as the most balanced and accurate
model for this classification problem due to its strong learning strategy, error-
correcting iterations, and robustness to noise. While CatBoost and Random
Forest showed nearly similar performance, GBC’s precision-recall balance and
lower misclassification rate make it the most dependable choice.
In the second screenshot, the input field contains the legitimate and well-
known domain https://web.whatsapp.com/. Upon clicking “Scan URL,” the
result returned is “Website is Safe to Use,” and a green button labeled
“Continue” appears. This reassures the user that the domain has passed all
phishing checks and is not flagged as malicious. The classification results
are made possible through a trained machine learning model, which, in this
case, is the Gradient Boosting Classifier. This model analyzes a wide range of
features, including URL length, presence of IP address, number of subdomains,
presence of ”@” symbols, and HTTPS tokens. If the extracted features resemble
patterns commonly associated with phishing websites, the model categorizes
the URL as dangerous. Otherwise, it considers it safe. Aesthetically, the
application is designed with color cues — red for unsafe and green for safe
— to provide immediate visual feedback. The warning and success messages
are also surrounded by soft borders and cards to enhance user experience and
43
application, allowing end users to interact with the system via a simple and
intuitive graphical interface.
The web interface enables users to input a URL and receive an instant
assessment of whether the website is safe or potentially malicious. Depending
on the classification outcome, the application returns visual cues and warning
messages, including options to proceed at one’s own risk in case of a detected
phishing site. These functionalities aim to enhance awareness and empower
users to make informed decisions before accessing potentially harmful links.
Two critical screenshots, which form part of the execution results, confirm
the system’s effectiveness in correctly classifying both phishing and legitimate
URLs.
From a technical standpoint, the system encapsulates end-to-end machine
learning development — starting from data ingestion to final deployment. It
highlights the importance of data preprocessing, feature engineering, model
training, evaluation, and most importantly, integration with real-world appli-
cations. The system also exemplifies the practical use of Flask for creating
lightweight APIs and serving machine learning models without excessive over-
head.
Identified Limitations
• The current model relies only on static URL-based features.
• Dataset may not cover the most recent or evolving phishing tactics.
– Rate limiting
– User authentication
Looking ahead, this project lays the groundwork for building more compre-
hensive phishing detection systems that combine multiple sources of intelligence
— including Natural Language Processing (NLP) for analyzing page content
and deep learning models for behavioral analysis. The modularity of the
system also allows it to be expanded into a browser extension, mobile app,
or API service that integrates with enterprise cybersecurity frameworks.
In conclusion, this project has successfully demonstrated how machine
learning can be harnessed to detect phishing websites based on URL features.
It combines theoretical knowledge with practical implementation, offering a
reliable and user-friendly tool that addresses a real-world cybersecurity prob-
lem. While there is room for further enhancements, the current system
effectively fulfills its intended purpose and provides a strong foundation for
future development. It highlights the growing role of artificial intelligence in
protecting digital identities and promoting safer internet usage for individuals
and organizations alike.
46
modalities.
To maintain long-term effectiveness, phishing detection systems must be
capable of continuous learning and adaptation. Static models degrade in per-
formance over time as attackers adopt new tactics. Future systems should
employ automated data pipelines that regularly ingest fresh data from hon-
eypots, threat databases, and public reports. These systems can benefit from
scheduled retraining or online learning techniques to incrementally update
model parameters without requiring full-scale retraining. Federated learning
offers a privacy-preserving way to personalize detection across devices without
compromising user data, which is especially valuable in mobile and enterprise
environments.
Another crucial area for development is cross-platform usability and real-
time deployment. For phishing detection tools to be truly effective, they must
be easily accessible and lightweight across various user environments. Browser
extensions that actively monitor browsing sessions, mobile applications that
scan SMS and messaging platforms, and desktop plugins that integrate with
email clients are all practical options. Moreover, providing phishing detection
as an API service allows for seamless integration into third-party applications
such as email security gateways, enterprise dashboards, and educational learning
platforms. This not only ensures broader reach but also promotes a layered
approach to cybersecurity.
Integrating real-time threat intelligence feeds can significantly strengthen
phishing detection models. Blacklists and reputation-based databases allow for
quick identification of known malicious domains, while APIs from cybersecurity
services such as PhishTank and IBM X-Force provide real-time indicators of
compromise. When combined with machine learning models, these threat feeds
can serve as an additional decision-making layer, improving both speed and
accuracy of detection through hybrid methodologies.
In conclusion, the future of phishing detection lies in building intelligent,
adaptive, and user-centric systems that blend advanced technical capabilities
with practical real-world applications. By continuing to expand in these
directions, we can create a more secure and informed digital society.
[5] Mughaid, Ala, et al. “An Intelligent Cyber Security Phishing Detection
System Using Deep Learning Techniques.” Cluster Computing, vol. 25,
no. 6, May 2022, pp. 3819–3828. Springer, https://doi.org/10.1007/
s10586-022-03604-4.
[7] Gupta, Gourav, et al. “Phishing URL Detection Using Deep Learn-
ing Techniques.” Multimedia Tools and Applications, vol. 82, no. 11,
Mar. 2023, pp. 17035–17061. Springer, https://doi.org/10.1007/
s11042-022-12994-w.
[8] Sahingoz, Ozgur Koray, et al. “Machine Learning Based Phishing Detec-
tion from URLs.” Expert Systems with Applications, vol. 117, Mar. 2019,
[10] Zhao, Zhijing, and Xinyu Peng. “Detection of Phishing Websites Based
on Machine Learning.” Security and Communication Networks, vol. 2022,
Article ID 5473543, 2022. Hindawi, https://doi.org/10.1155/2022/
5473543.
[19] Aljofey, A., Q. Jiang, Q. Qu, and J. P. Niyigena. ”An Effective Phishing
Detection Model Based on Character Level Convolutional Neural Network
from URL,” Sep. 2020.
[29] Huang, Y., Q. Yang, Q. Jinghui, and W. Wen. ”Phishing URL Detection
via CNN and Attention-Based Hierarchical RNN,” Conference Paper, Aug.
2019.
[30] Feng, T., and C. Yue. ”Visualizing and Interpreting RNN Models in
URL-based Phishing Detection,” Conference Paper, Jun. 2020.
[32] Zhou, Y., Y. Zhang, J. Xiao, and W. Lin. ”Visual Similarity Based Anti-
phishing with the Combination of Local and Global Features,” Conference
Paper, Sep. 2014.
[38] Zhan, Z.-H., J.-Y. Li, and J. Zhang. ”Evolutionary deep learning: A
survey,” Neurocomputing, Apr. 2022.
[40] Singh, S., M. P. Singh, and R. Pandey. ”Phishing Detection from URLs
Using Deep Learning Approach,” Conference Paper, Oct. 2020.
Sathvik Kadali
113-PHISHING PROJECT FINAL REPORT1.pdf
Chaitanya Bharathi Institute of Technology
Document Details
Submission ID
trn:oid:::25127:91504398 52 Pages
Download Date
File Name
File Size
1.3 MB
4 Missing Citation 0%
Matches that have quotation marks, but no in-text citation
Integrity Flags
0 Integrity Flags for Review
Our system's algorithms look deeply at a document for any inconsistencies that
No suspicious text manipulations found. would set it apart from a normal submission. If we notice something strange, we flag
it for you to review.
4 Missing Citation 0%
Matches that have quotation marks, but no in-text citation
Top Sources
The sources with the highest number of matches within the submission. Overlapping sources will not be displayed.
1 Internet
www.coursehero.com 4%
2 Internet
www.researchgate.net 1%
3 Internet
doaj.org <1%
4 Internet
diet.edu.in <1%
5 Internet
eitca.org <1%
6 Internet
www.mdpi.com <1%
7 Internet
philstat.org <1%
8 Internet
www.bjmc.lu.lv <1%
9 Publication
10 Internet
arxiv.org <1%