    Mac OS X            	   2                                             ATTR          Y                   I  /com.apple.metadata:kMDItemKeyphraseConfidences       
  *com.apple.metadata:kMDItemKeyphraseLabels      m   +  +com.apple.metadata:kMDItemKeyphraseVersion        ,  .com.apple.metadata:kMDItemTextContentLanguage           com.apple.quarantine bplist00m	

 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklm#?i@   #? ?Xb#?ZD1#?k   #?1#?c   #?tA#?#?W   #?]a#?1+v#?*Z%#?਀   #?.Za#?   #?5D1#?\06#?nO    #?m@   #?(   #?WY   #?)?#?W    #?Y    #?@4`#?D]#?=   #?:#?pM#?◑u#?Z$'ts#?oiP#?    #?x    #?k̀   #?Ԙw{#?DY   #?Ap#?    #?<ӕJP#?鼕JP#?ۅͱ7#?3Q#?K#?؄k    #?l#?+ΎѢ#?ь#?   #?n    #?ӟ#?cR[0#?^#?y    #?\    #?   #?i    #?H-   #?<Ҁ   #?-&#?˫    #?=x9Ap#?q    #?9R#?ƀ     #?99c#?F(#?    #?>2    #?#?      #?|s#?      #?      #?      #?ـ#?5dR#?4d#~P#«#A/l #d&I2 #}n#eͫ#    #	kp#8-UN#f#ǃrV@#ۅ#y<    #Y#uD#>0;Bk#r@#8 = #Ԕ    #s    #    #Ϙ    #֐#р     #ɝځ@# #    #كvg#o1#kY#J]
E#Ht      x               #,5>GPYbkt}
(1:CLU^gpy 	$-6?HQZclu~ )2;D             n              Mbplist00m	

 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklm[google docs_detailed analysis_prevent future infections\domain names_google docs url_valuable resource_logical reasoning]commonly used]pay attention_general description_code interpreter_detecting phishing attempts_accurately identify_determining whether^paid attention_reducing false positives_manual verification process_potential consequences_unrelated examples_sophisticated techniques\primary goal\move forward_simply repeating_consider collaborating_cybersecurity research_large collection of urlsZfull score_verification process^uploaded files_unrelated issues_$including examples of malicious urls_google sites urls_identify examples_close examination\issues occur_,development of machine learning-based models_legitimate purposes_ addressing sophisticated threats_reputable domainsXlow rateYhigh rate_7complexity of accurately categorizing urls based solely_metric criteria_issue description^legitimate url_relevant context_ training machine learning models_multiple issues^domain experts_properly examine_"ensuring accurate labeling of urls^actual content_6identification of legitimate reputable urls improperly_query parameters^metric ensures]domains known\issue occurs[agent based_significant role_identifying malicious urls\issues exist_%issue of potential overclassification\rating rules_$legitimate reputable urls improperly\malware urls_content of urls^exact evidence^clear location_generic statement^specific issue_categorizes urls_&identifying legitimate urls improperly_legitimate urls\include urlsYsafe urls_displayed content[medium rate_external internet access_finding legitimate urls_-utilizing third-party url reputation services_classification of urls^review of urls_legitimate urls improperly_metric stresses_content detailsYfull path^involved files_!automated url reputation analysis_detailed context evidence_identify involves]phishing urls_defacement urls_integrity of datasets_obvious mismatches_ different security threat levels_correctly spotted_dataset consists^answer implies_erroneously labeled_examining known legitimate urls\several urls_finding of issues_human evaluators^urls belonging_accurate context evidence]issue context_answer evaluator_correct evidence context^hint disclosed  x       	-@^t (5Haz (<Ix$8GZ}1@N[gz 
.=Q`s Jcr .@Xm			2	A	]	k	~	             n              	bplist00                            
bplist00Ren                            q/0081;66fcbd34;Arc; 