Your selections:
Authorship attribution for Twitter in 140 characters or less
- Layton, Robert, Watters, Paul, Dazeley, Richard
Determining provenance in phishing websites using automated conceptual analysis
- Layton, Robert, Watters, Paul
ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?
- Watters, Paul, Herps, Aaron, Layton, Robert, McCombie, Stephen
Unsupervised authorship analysis of phishing webpages
- Layton, Robert, Watters, Paul, Dazeley, Richard
Using differencing to increase distinctiveness for phishing website clustering
- Layton, Robert, Brown, Simon, Watters, Paul
Are you sure you would like to clear your session, including search history and login status?