Your selections:
Using stereotypes to improve early-match poker play
- Layton, Robert, Vamplew, Peter, Turville, Christopher
Determining provenance in phishing websites using automated conceptual analysis
- Layton, Robert, Watters, Paul
Using differencing to increase distinctiveness for phishing website clustering
- Layton, Robert, Brown, Simon, Watters, Paul
Authorship attribution for Twitter in 140 characters or less
- Layton, Robert, Watters, Paul, Dazeley, Richard
Automatically determining phishing campaigns using the USCAP methodology
- Layton, Robert, Watters, Paul, Dazeley, Richard
Malware detection based on structural and behavioural features of API calls
- Alazab, Mamoun, Layton, Robert, Venkatraman, Sitalakshmi, Watters, Paul
The seven scam types: Mapping the terrain of cybercrime
- Stabek, Amber, Watters, Paul, Layton, Robert
Application of SVM in citation information extraction
- Liang, Jiguang, Layton, Robert, Wang, Wei
Fake file detection in P2P networks by consensus and reputation
- Watters, Paul, Layton, Robert
How much material on BitTorrent is infringing content? A case study
- Watters, Paul, Layton, Robert, Dazeley, Richard
Authorship attribution of IRC messages using inverse author frequency
- Layton, Robert, McCombie, Stephen, Watters, Paul
Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP)
- Watters, Paul, McCombie, Stephen, Layton, Robert, Pieprzyk, Josef
Characterising network traffic for Skype forensics
- Azab, Ahmad, Watters, Paul, Layton, Robert
Identifying cyber predators through forensic authorship analysis of chat logs
- Amuchi, Faith, Al-Nemrat, Ameer, Alazab, Mamoun, Layton, Robert
Recentred local profiles for authorship attribution
- Layton, Robert, Watters, Paul, Dazeley, Richard
Towards an implementation of information flow security using semantic web technologies
- Ureche, Oana, Layton, Robert, Watters, Paul
Unsupervised authorship analysis of phishing webpages
- Layton, Robert, Watters, Paul, Dazeley, Richard
API design for machine learning software: experiences from the scikit-learn project
- Buitinick, Lars, Louppe, Gilles, Blondel, Mathieu, Pedregosa, Fabian, Mueller, Andrea, Grisel, Olivier, Nicuale, Vlad, Prettenhofer, Peter, Gramfort, Alexandre, Grobler, Jaques, Layton, Robert, Vanderplas, Jake, Joly, Arnaud, Holt, Brian, Varoquax, Gael
Authorship analysis of aliases: Does topic influence accuracy?
- Layton, Robert, Watters, Paul, Dazeley, Richard
Automated unsupervised authorship analysis using evidence accumulation clustering
- Layton, Robert, Watters, Paul, Dazeley, Richard
Are you sure you would like to clear your session, including search history and login status?