Your selections:
Malware detection based on structural and behavioural features of API calls
- Alazab, Mamoun, Layton, Robert, Venkatraman, Sitalakshmi, Watters, Paul
Internet security applications of Grobner-Shirvov bases
- Kelarev, Andrei, Yearwood, John, Watters, Paul
- Islam, Mofakharul, Watters, Paul
A Grobner-Shirshov Algorithm for Applications in Internet Security
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Ma, Liping, Abawajy, Jemal, Pan, L.
Accessibility solutions for visually impaired users of web discussion boards
- Watters, Paul, Arajuo, A, Hezart, A, Naik, S
Detecting illicit drugs on social media using Automated Social Media Intelligence Analysis (ASMIA)
Indirect information linkage for OSINT through authorship analysis of aliases
- Layton, Robert, Perez, Charles, Birregah, Babiga, Watters, Paul, Lemercier, Marc
- Islam, Mofakharul, Watters, Paul, Yearwood, John
Skype Traffic Classification Using Cost Sensitive Algorithms
- Azab, Azab, Layton, Robert, Alazab, Mamoun, Watters, Paul
Recentred local profiles for authorship attribution
- Layton, Robert, Watters, Paul, Dazeley, Richard
Measuring Surveillance in Online Advertising: A Big Data Approach
- Herps, Aaron, Watters, Paul, Pineda-Villavicencio, Guillermo
Descriptive data mining on fraudulent online dating profiles
- Pan, Jinjian A., Winchester, Donald, Land, Lesley, Watters, Paul
Automated unsupervised authorship analysis using evidence accumulation clustering
- Layton, Robert, Watters, Paul, Dazeley, Richard
Fake file detection in P2P networks by consensus and reputation
- Watters, Paul, Layton, Robert
Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP)
- Watters, Paul, McCombie, Stephen, Layton, Robert, Pieprzyk, Josef
Establishing reasoning communities of security experts for Internet Commerce Security
- Kelarev, Andrei, Brown, Simon, Watters, Paul, Wu, Xinwen, Dazeley, Richard
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
Identifying Faked Hotel Reviews Using Authorship Analysis
- Layton, Robert, Watters, Paul, Ureche, Oana
REPLOT: REtrieving profile links on Twitter for suspicious networks detection
- Perez, Charles, Birregah, Babiga, Layton, Robert, Lemercier, Marc, Watters, Paul
ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?
- Watters, Paul, Herps, Aaron, Layton, Robert, McCombie, Stephen
Are you sure you would like to clear your session, including search history and login status?