GlobalView

Watters, Paul

Showing items 1 - 15 of 83.

Add to Quick Collection   All 83 Results

Sort:
 Add All Items to Quick Collection
Date: 2015
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/100008
Description: Social networking sites are increasingly subject to malicious activities such as self-propagating worms, confidence scams and drive-by-download malwares. The high number of users associated with the p... More
Reviewed: Reviewed
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/73771
Description: Aliases play an important role in online environments by facilitating anonymity, but also can be used to hide the identity of cybercriminals. Previous studies have investigated this alias matching pro... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/63717
Description: Authorship Analysis aims to extract information about the authorship of documents from features within those documents. Typically, this is performed as a classification task with the aim of identifyin... More
Full Text: Full Text
Reviewed: Reviewed
Image Thumbnail
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/36009
Description: Unsupervised Authorship Analysis (UAA) aims to cluster documents by authorship without knowing the authorship of any documents. An important factor in UAA is the method for calculating the distance be... More
Full Text: Full Text
Reviewed: Reviewed
Image Thumbnail
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/41597
Description: WHOIS acts as a registry for organisations or individuals who 'own' or take responsibility for domains. For any registry to be functional, its integrity needs to be assured. Unfortunately, WHOIS data ... More
Reviewed: Reviewed
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/66367
Description: The use of online review sites has grown significantly, allowing for communities to share information on products or services.These online review sites are marketed as being independent and trustworth... More
Reviewed: Reviewed
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/67206
Description: The steady growth of the Internet, sophisticated digital image processing technology, the cheap availability of storage devices and surfer's ever-increasing interest on images have been contributing t... More
Full Text: Full Text
Reviewed: Reviewed
Image Thumbnail
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/57468
Description: With the advent of the Internet along with sophisticated digital image processing technology, the Internet quickly became the principal medium for the distribution of pornographic content favouring po... More
Full Text: Full Text
Reviewed: Reviewed
Image Thumbnail
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/40100
Description: In this paper we examine the problem of automatically linking online accounts for open source intelligence gathering. We specifically aim to determine if two social media accounts are shared by the sa... More
Reviewed: Reviewed
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/72037
Description: Detecting malicious software or malware is one of the major concerns in information security governance as malware authors pose a major challenge to digital forensics by using a variety of highly soph... More
Reviewed: Reviewed
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/76647
Description: Our approach to the author identification task uses existing authorship attribution methods using local n-grams (LNG) and performs a weighted ensemble. This approach came in third for this year's comp... More
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/65335
Description: There is an increasing public and policy awareness that tracking cookies are being used to support behavioral advertising, but the extent to which tracking is occurring is not clear. The extent of tra... More
Reviewed: Reviewed
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/38056
Description: Recent research has indicated that cybercrime thrives when a corrupt social, economic, and political environment emerges such that law enforcement impact is minimised and key elements of crime prevent... More
Reviewed: Reviewed
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/62094
Description: In the last few decades social networking sites have encountered their first large-scale security issues. The high number of users associated with the presence of sensitive data (personal or professio... More
Reviewed: Reviewed
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/67589
Description: Voice over IP (VoIP) technologies such as Skype are becoming increasingly popular and widely used in different organisations, and therefore identifying the usage of this service at the network level b... More
Reviewed: Reviewed