Your selections:
Crime toolkits: The productisation of cybercrime
- Alazab, Ammar, Abawajy, Jemal, Hobbs, Michael, Layton, Robert, Khraisat, Ansam
Malware detection based on structural and behavioural features of API calls
- Alazab, Mamoun, Layton, Robert, Venkatraman, Sitalakshmi, Watters, Paul
Malicious Spam Emails Developments and Authorship Attribution
- Alazab, Mamoun, Layton, Robert, Broadhurst, Roderic, Bouhours, Brigitte
Identifying cyber predators through forensic authorship analysis of chat logs
- Amuchi, Faith, Al-Nemrat, Ameer, Alazab, Mamoun, Layton, Robert
Mining malware to detect variants
- Azab, Ahmad, Layton, Robert, Alazab, Mamoun, Oliver, Jonathan
Characterising network traffic for Skype forensics
- Azab, Ahmad, Watters, Paul, Layton, Robert
Skype Traffic Classification Using Cost Sensitive Algorithms
- Azab, Azab, Layton, Robert, Alazab, Mamoun, Watters, Paul
Be careful who you trust: Issues with the public key infrastructure
API design for machine learning software: experiences from the scikit-learn project
- Buitinick, Lars, Louppe, Gilles, Blondel, Mathieu, Pedregosa, Fabian, Mueller, Andrea, Grisel, Olivier, Nicuale, Vlad, Prettenhofer, Peter, Gramfort, Alexandre, Grobler, Jaques, Layton, Robert, Vanderplas, Jake, Joly, Arnaud, Holt, Brian, Varoquax, Gael
Ethical considerations when using online datasets for research purposes
- Kopp, Christian, Layton, Robert, Gondal, Iqbal, Sillitoe, Jim
The role of love stories in Romance Scams : A qualitative analysis of fraudulent profiles
- Kopp, Christian, Layton, Robert, Sillitoe, Jim, Gondal, Iqbal
Online romance scam: Expensive e-living for romantic happiness
- Kopp, Christian, Sillitoe, James, Gondal, Iqbal, Layton, Robert
Using differencing to increase distinctiveness for phishing website clustering
- Layton, Robert, Brown, Simon, Watters, Paul
Determining provenance in phishing websites using automated conceptual analysis
- Layton, Robert, Watters, Paul
Using stereotypes to improve early-match poker play
- Layton, Robert, Vamplew, Peter, Turville, Christopher
Automatically determining phishing campaigns using the USCAP methodology
- Layton, Robert, Watters, Paul, Dazeley, Richard
Authorship attribution for Twitter in 140 characters or less
- Layton, Robert, Watters, Paul, Dazeley, Richard
Evaluating authorship distance methods using the positive Silhouette coefficient
- Layton, Robert, Watters, Paul, Dazeley, Richard
Unsupervised authorship analysis of phishing webpages
- Layton, Robert, Watters, Paul, Dazeley, Richard
Authorship attribution of IRC messages using inverse author frequency
- Layton, Robert, McCombie, Stephen, Watters, Paul
Are you sure you would like to clear your session, including search history and login status?