Local n-grams for author identification: Notebook for PAN at CLEF 2013 C3 - CEUR Workshop Proceedings
Towards an implementation of information flow security using semantic web technologies
Unsupervised authorship analysis of phishing webpages
Zero-day malware detection based on supervised learning algorithms of API call signatures
The seven scam types: Mapping the terrain of cybercrime
Towards understanding malware behaviour by the extraction of API calls
Windows rootkits: Attacks and countermeasures
Are you sure you would like to clear your session, including search history and login status?