Your selections:
The maximum degree & diameter-bounded subgraph and its applications
- Dekker, Anthony, Pérez-Rosés, Hebert, Pineda-Villavicencio, Guillermo, Watters, Paul
Challenges to automated allegory resolution in open source intelligence
Internet subcultures and pathways to the use of child pornography
- Prichard, Jeremy, Watters, Paul, Spiranovic, Caroline
Cybersickness and anxiety during simulated motion : Implications for VRET
Accessible virtual reality therapy using portable media devices
Selecting parameters for phase space reconstruction of the electrocorticogram (ECoG)
A preliminary profiling of internet money mules : An Australian perspective
- Aston, Manny, McCombie, Stephen, Reardon, Ben, Watters, Paul
Enabling access to British birth cohort studies: A secure web interface for the NSHD (SWIFT)
- Watters, Paul, Kuh, Diana, Latham, Susan, Garwood, Kevin, Shah, Imran
The factor structure of cybersickness
Unsupervised authorship analysis of phishing webpages
- Layton, Robert, Watters, Paul, Dazeley, Richard
Authorship attribution of IRC messages using inverse author frequency
- Layton, Robert, McCombie, Stephen, Watters, Paul
Local n-grams for author identification: Notebook for PAN at CLEF 2013 C3 - CEUR Workshop Proceedings
- Layton, Robert, Watters, Paul, Dazeley, Richard
Zero-day malware detection based on supervised learning algorithms of API call signatures
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz
Illicit image detection using erotic pose estimation based on kinematic constraints
- Islam, Mofakharul, Watters, Paul, Yearwood, John, Hussain, Mazher, Swarna, Lubaba
Information security governance: The art of detecting hidden malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
- Watters, Paul, Lueg, Christopher, Spiranovic, Caroline, Prichard, Jeremy
Child face detection using age specific luminance invariant geometric descriptor
- Islam, Mofakharul, Watters, Paul, Yearwood, John
- Islam, Mofakharul, Watters, Paul
Authorship analysis of aliases: Does topic influence accuracy?
- Layton, Robert, Watters, Paul, Dazeley, Richard
A methodology for analyzing the credential marketplace
- Watters, Paul, McCombie, Stephen
Are you sure you would like to clear your session, including search history and login status?