Local n-grams for author identification: Notebook for PAN at CLEF 2013 C3 - CEUR Workshop Proceedings
Towards an implementation of information flow security using semantic web technologies
Unsupervised authorship analysis of phishing webpages
The seven scam types: Mapping the terrain of cybercrime
Are you sure you would like to clear your session, including search history and login status?