Your selections:
Improving authorship attribution in twitter through topic-based sampling
- Pan, Luoxi, Gondal, Iqbal, Layton, Robert
Online romance scam: Expensive e-living for romantic happiness
- Kopp, Christian, Sillitoe, James, Gondal, Iqbal, Layton, Robert
Authorship analysis of the zeus botnet source code
Local n-grams for author identification: Notebook for PAN at CLEF 2013 C3 - CEUR Workshop Proceedings
- Layton, Robert, Watters, Paul, Dazeley, Richard
Authorship attribution of IRC messages using inverse author frequency
- Layton, Robert, McCombie, Stephen, Watters, Paul
Characterising network traffic for Skype forensics
- Azab, Ahmad, Watters, Paul, Layton, Robert
Identifying cyber predators through forensic authorship analysis of chat logs
- Amuchi, Faith, Al-Nemrat, Ameer, Alazab, Mamoun, Layton, Robert
Towards an implementation of information flow security using semantic web technologies
- Ureche, Oana, Layton, Robert, Watters, Paul
Unsupervised authorship analysis of phishing webpages
- Layton, Robert, Watters, Paul, Dazeley, Richard
Application of SVM in citation information extraction
- Liang, Jiguang, Layton, Robert, Wang, Wei
Fake file detection in P2P networks by consensus and reputation
- Watters, Paul, Layton, Robert
Malware detection based on structural and behavioural features of API calls
- Alazab, Mamoun, Layton, Robert, Venkatraman, Sitalakshmi, Watters, Paul
The seven scam types: Mapping the terrain of cybercrime
- Stabek, Amber, Watters, Paul, Layton, Robert
Are you sure you would like to clear your session, including search history and login status?