Your selections:
Malicious code detection using penalized splines on OPcode frequency
- Alazab, Mamoun, Al Kadiri, Mohammad, Venkatraman, Sitalakshmi, Al-Nemrat, Ameer
Identifying cyber predators through forensic authorship analysis of chat logs
- Amuchi, Faith, Al-Nemrat, Ameer, Alazab, Mamoun, Layton, Robert
Analysis of firewall log-based detection scenarios for evidence in digital forensics
- Mukhtar, Rubiu, Al-Nemrat, Ameer, Alazab, Mamoun, Venkatraman, Sitalakshmi, Jahankhani, Hamid
Are you sure you would like to clear your session, including search history and login status?