Local n-grams for author identification: Notebook for PAN at CLEF 2013 C3 - CEUR Workshop Proceedings
The seven scam types: Mapping the terrain of cybercrime
Towards an implementation of information flow security using semantic web technologies
Unsupervised authorship analysis of phishing webpages
Are you sure you would like to clear your session, including search history and login status?