Your selections:
Crime toolkits: The productisation of cybercrime
- Alazab, Ammar, Abawajy, Jemal, Hobbs, Michael, Layton, Robert, Khraisat, Ansam
Automated unsupervised authorship analysis using evidence accumulation clustering
- Layton, Robert, Watters, Paul, Dazeley, Richard
Fake file detection in P2P networks by consensus and reputation
- Watters, Paul, Layton, Robert
Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP)
- Watters, Paul, McCombie, Stephen, Layton, Robert, Pieprzyk, Josef
Malicious Spam Emails Developments and Authorship Attribution
- Alazab, Mamoun, Layton, Robert, Broadhurst, Roderic, Bouhours, Brigitte
Identifying Faked Hotel Reviews Using Authorship Analysis
- Layton, Robert, Watters, Paul, Ureche, Oana
REPLOT: REtrieving profile links on Twitter for suspicious networks detection
- Perez, Charles, Birregah, Babiga, Layton, Robert, Lemercier, Marc, Watters, Paul
ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?
- Watters, Paul, Herps, Aaron, Layton, Robert, McCombie, Stephen
REPLOT : REtrieving Profile Links on Twitter for malicious campaign discovery
- Perez, Charles, Birregah, Babiga, Layton, Robert, Lemercier, Marc, Watters, Paul
Improving authorship attribution in twitter through topic-based sampling
- Pan, Luoxi, Gondal, Iqbal, Layton, Robert
Authorship analysis of the zeus botnet source code
Optimization based clustering algorithms for authorship analysis of phishing emails
- Seifollahi, Sattar, Bagirov, Adil, Layton, Robert, Gondal, Iqbal
Ethical considerations when using online datasets for research purposes
- Kopp, Christian, Layton, Robert, Gondal, Iqbal, Sillitoe, Jim
Be careful who you trust: Issues with the public key infrastructure
Automating Open Source Intelligence: Algorithms for OSINT
- Layton, Robert, Watters, Paul
The role of love stories in Romance Scams : A qualitative analysis of fraudulent profiles
- Kopp, Christian, Layton, Robert, Sillitoe, Jim, Gondal, Iqbal
Relative cyberattack Attribution
Mining malware to detect variants
- Azab, Ahmad, Layton, Robert, Alazab, Mamoun, Oliver, Jonathan
Characterising network traffic for Skype forensics
- Azab, Ahmad, Watters, Paul, Layton, Robert
Online romance scam: Expensive e-living for romantic happiness
- Kopp, Christian, Sillitoe, James, Gondal, Iqbal, Layton, Robert
Are you sure you would like to clear your session, including search history and login status?