Estimating distributed coding efficiently in orthogonal models of facial processing
Evaluating authorship distance methods using the positive Silhouette coefficient
- Layton, Robert, Watters, Paul, Dazeley, Richard
Fake file detection in P2P networks by consensus and reputation
- Watters, Paul, Layton, Robert
How much material on BitTorrent is infringing content? A case study
- Watters, Paul, Layton, Robert, Dazeley, Richard
ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?
- Watters, Paul, Herps, Aaron, Layton, Robert, McCombie, Stephen
Identifying Faked Hotel Reviews Using Authorship Analysis
- Layton, Robert, Watters, Paul, Ureche, Oana
Identifying rootkit infections using data mining
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
Illicit image detection : An MRF model based stochastic approach
- Islam, Mofakharul, Watters, Paul, Yearwood, John, Hussain, Mazher, Swarna, Lubaba
Illicit image detection using erotic pose estimation based on kinematic constraints
- Islam, Mofakharul, Watters, Paul, Yearwood, John, Hussain, Mazher, Swarna, Lubaba
Indirect information linkage for OSINT through authorship analysis of aliases
- Layton, Robert, Perez, Charles, Birregah, Babiga, Watters, Paul, Lemercier, Marc
Information security governance: The art of detecting hidden malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Internet security applications of Grobner-Shirvov bases
- Kelarev, Andrei, Yearwood, John, Watters, Paul
Internet security applications of the Munn rings
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Abawajy, Jemal, Pan, L.
Internet subcultures and pathways to the use of child pornography
- Prichard, Jeremy, Watters, Paul, Spiranovic, Caroline
Local n-grams for author identification: Notebook for PAN at CLEF 2013 C3 - CEUR Workshop Proceedings
- Layton, Robert, Watters, Paul, Dazeley, Richard
Malware detection based on structural and behavioural features of API calls
- Alazab, Mamoun, Layton, Robert, Venkatraman, Sitalakshmi, Watters, Paul
Measuring Surveillance in Online Advertising: A Big Data Approach
- Herps, Aaron, Watters, Paul, Pineda-Villavicencio, Guillermo
New traceability codes and identification algorithm for tracing pirates
- Wu, Xinwen, Watters, Paul, Yearwood, John
Optimization of classifiers for data mining based on combinatorial semigroups
- Kelarev, Andrei, Yearwood, John, Watters, Paul
- Watters, Paul, Lueg, Christopher, Spiranovic, Caroline, Prichard, Jeremy
Are you sure you would like to clear your session, including search history and login status?