Your selections:
Spam email categorization with nlp and using federated deep learning
- Ul Haq, Ikram, Black, Paul, Gondal, Iqbal, Kamruzzaman, Joarder, Watters, Paul, Kayes, A.
Security and blockchain convergence with internet of multimedia things : current trends, research challenges and future directions
- Jan, Mian, Cai, Jinjin, Gao, Xiang-Chuan, Khan, Fazlullah, Mastorakis, Spyridon, Usman, Muhammad, Alazab, Mamoun, Watters, Paul
API based discrimination of ransomware and benign cryptographic programs
- Black, Paul, Sohail, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder, Vamplew, Peter, Watters, Paul
Rapid anomaly detection using integrated prudence analysis (IPA)
- Maruatona, Omaru, Vamplew, Peter, Dazeley, Richard, Watters, Paul
Automating Open Source Intelligence: Algorithms for OSINT
- Layton, Robert, Watters, Paul
REPLOT : REtrieving Profile Links on Twitter for malicious campaign discovery
- Perez, Charles, Birregah, Babiga, Layton, Robert, Lemercier, Marc, Watters, Paul
Authorship analysis of aliases: Does topic influence accuracy?
- Layton, Robert, Watters, Paul, Dazeley, Richard
Automated unsupervised authorship analysis using evidence accumulation clustering
- Layton, Robert, Watters, Paul, Dazeley, Richard
Evaluating authorship distance methods using the positive Silhouette coefficient
- Layton, Robert, Watters, Paul, Dazeley, Richard
ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?
- Watters, Paul, Herps, Aaron, Layton, Robert, McCombie, Stephen
Identifying Faked Hotel Reviews Using Authorship Analysis
- Layton, Robert, Watters, Paul, Ureche, Oana
Illicit image detection : An MRF model based stochastic approach
- Islam, Mofakharul, Watters, Paul, Yearwood, John, Hussain, Mazher, Swarna, Lubaba
Illicit image detection using erotic pose estimation based on kinematic constraints
- Islam, Mofakharul, Watters, Paul, Yearwood, John, Hussain, Mazher, Swarna, Lubaba
Indirect information linkage for OSINT through authorship analysis of aliases
- Layton, Robert, Perez, Charles, Birregah, Babiga, Watters, Paul, Lemercier, Marc
Information security governance: The art of detecting hidden malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Local n-grams for author identification: Notebook for PAN at CLEF 2013 C3 - CEUR Workshop Proceedings
- Layton, Robert, Watters, Paul, Dazeley, Richard
Measuring Surveillance in Online Advertising: A Big Data Approach
- Herps, Aaron, Watters, Paul, Pineda-Villavicencio, Guillermo
- Watters, Paul, Lueg, Christopher, Spiranovic, Caroline, Prichard, Jeremy
REPLOT: REtrieving profile links on Twitter for suspicious networks detection
- Perez, Charles, Birregah, Babiga, Layton, Robert, Lemercier, Marc, Watters, Paul
Skype Traffic Classification Using Cost Sensitive Algorithms
- Azab, Azab, Layton, Robert, Alazab, Mamoun, Watters, Paul
Are you sure you would like to clear your session, including search history and login status?