Your selections:
Rapid anomaly detection using integrated prudence analysis (IPA)
- Maruatona, Omaru, Vamplew, Peter, Dazeley, Richard, Watters, Paul
Authorship attribution of IRC messages using inverse author frequency
- Layton, Robert, McCombie, Stephen, Watters, Paul
Challenges to automated allegory resolution in open source intelligence
Characterising network traffic for Skype forensics
- Azab, Ahmad, Watters, Paul, Layton, Robert
A survey on latest botnet attack and defense
- Zhang, Lei, Yu, Shui, Wu, Di, Watters, Paul
Child face detection using age specific luminance invariant geometric descriptor
- Islam, Mofakharul, Watters, Paul, Yearwood, John
Determining the influence of visual training on EEG activity patterns using association rule mining
- Yan, Fangang, Watters, Paul, Wang, Wei
Fake file detection in P2P networks by consensus and reputation
- Watters, Paul, Layton, Robert
Malware detection based on structural and behavioural features of API calls
- Alazab, Mamoun, Layton, Robert, Venkatraman, Sitalakshmi, Watters, Paul
- Islam, Mofakharul, Watters, Paul
Are you sure you would like to clear your session, including search history and login status?