Your selections:
Spam email categorization with nlp and using federated deep learning
- Ul Haq, Ikram, Black, Paul, Gondal, Iqbal, Kamruzzaman, Joarder, Watters, Paul, Kayes, A.
API based discrimination of ransomware and benign cryptographic programs
- Black, Paul, Sohail, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder, Vamplew, Peter, Watters, Paul
ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?
- Watters, Paul, Herps, Aaron, Layton, Robert, McCombie, Stephen
Identifying Faked Hotel Reviews Using Authorship Analysis
- Layton, Robert, Watters, Paul, Ureche, Oana
Indirect information linkage for OSINT through authorship analysis of aliases
- Layton, Robert, Perez, Charles, Birregah, Babiga, Watters, Paul, Lemercier, Marc
Measuring Surveillance in Online Advertising: A Big Data Approach
- Herps, Aaron, Watters, Paul, Pineda-Villavicencio, Guillermo
REPLOT: REtrieving profile links on Twitter for suspicious networks detection
- Perez, Charles, Birregah, Babiga, Layton, Robert, Lemercier, Marc, Watters, Paul
Skype Traffic Classification Using Cost Sensitive Algorithms
- Azab, Azab, Layton, Robert, Alazab, Mamoun, Watters, Paul
Detecting illicit drugs on social media using Automated Social Media Intelligence Analysis (ASMIA)
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
A new procedure to help system/network administrators identify multiple rootkit infections
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
Authorship attribution for Twitter in 140 characters or less
- Layton, Robert, Watters, Paul, Dazeley, Richard
Automatically determining phishing campaigns using the USCAP methodology
- Layton, Robert, Watters, Paul, Dazeley, Richard
Descriptive data mining on fraudulent online dating profiles
- Pan, Jinjian A., Winchester, Donald, Land, Lesley, Watters, Paul
Identifying rootkit infections using data mining
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
RBACS : Rootkit behavioral analysis and classification system
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
A preliminary profiling of internet money mules : An Australian perspective
- Aston, Manny, McCombie, Stephen, Reardon, Ben, Watters, Paul
Automatically generating classifier for phishing email prediction
- Ma, Liping, Torney, Rosemary, Watters, Paul, Brown, Simon
Cybercrime attribution : An Eastern European case study
- McCombie, Stephen, Pieprzyk, Josef, Watters, Paul
Are you sure you would like to clear your session, including search history and login status?