Your selections:
ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?
- Watters, Paul, Herps, Aaron, Layton, Robert, McCombie, Stephen
A multi-tier ensemble construction of classifiers for phishing email detection and filtering
- Abawajy, Jemal, Kelarev, Andrei
Profiling phishing activity based on hyperlinks extracted from phishing emails
- Yearwood, John, Mammadov, Musa, Webb, Dean
Unsupervised authorship analysis of phishing webpages
- Layton, Robert, Watters, Paul, Dazeley, Richard
A survey on latest botnet attack and defense
- Zhang, Lei, Yu, Shui, Wu, Di, Watters, Paul
Authorship attribution for Twitter in 140 characters or less
- Layton, Robert, Watters, Paul, Dazeley, Richard
Consensus clustering and supervised classification for profiling phishing emails in internet commerce security
- Dazeley, Richard, Yearwood, John, Kang, Byeongho, Kelarev, Andrei
Automatically generating classifier for phishing email prediction
- Ma, Liping, Torney, Rosemary, Watters, Paul, Brown, Simon
Cybercrime attribution : An Eastern European case study
- McCombie, Stephen, Pieprzyk, Josef, Watters, Paul
Determining provenance in phishing websites using automated conceptual analysis
- Layton, Robert, Watters, Paul
Using differencing to increase distinctiveness for phishing website clustering
- Layton, Robert, Brown, Simon, Watters, Paul
Why do users trust the wrong messages? A behavioural model of phishing
Are you sure you would like to clear your session, including search history and login status?