Your selections:
ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?
- Watters, Paul, Herps, Aaron, Layton, Robert, McCombie, Stephen
Identifying Faked Hotel Reviews Using Authorship Analysis
- Layton, Robert, Watters, Paul, Ureche, Oana
Indirect information linkage for OSINT through authorship analysis of aliases
- Layton, Robert, Perez, Charles, Birregah, Babiga, Watters, Paul, Lemercier, Marc
REPLOT: REtrieving profile links on Twitter for suspicious networks detection
- Perez, Charles, Birregah, Babiga, Layton, Robert, Lemercier, Marc, Watters, Paul
Skype Traffic Classification Using Cost Sensitive Algorithms
- Azab, Azab, Layton, Robert, Alazab, Mamoun, Watters, Paul
Authorship attribution for Twitter in 140 characters or less
- Layton, Robert, Watters, Paul, Dazeley, Richard
Automatically determining phishing campaigns using the USCAP methodology
- Layton, Robert, Watters, Paul, Dazeley, Richard
Determining provenance in phishing websites using automated conceptual analysis
- Layton, Robert, Watters, Paul
Using differencing to increase distinctiveness for phishing website clustering
- Layton, Robert, Brown, Simon, Watters, Paul
Are you sure you would like to clear your session, including search history and login status?