Your selections:
ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?
- Watters, Paul, Herps, Aaron, Layton, Robert, McCombie, Stephen
Authorship attribution for Twitter in 140 characters or less
- Layton, Robert, Watters, Paul, Dazeley, Richard
Automatically generating classifier for phishing email prediction
- Ma, Liping, Torney, Rosemary, Watters, Paul, Brown, Simon
Cybercrime attribution : An Eastern European case study
- McCombie, Stephen, Pieprzyk, Josef, Watters, Paul
Determining provenance in phishing websites using automated conceptual analysis
- Layton, Robert, Watters, Paul
Using differencing to increase distinctiveness for phishing website clustering
- Layton, Robert, Brown, Simon, Watters, Paul
Why do users trust the wrong messages? A behavioural model of phishing
Are you sure you would like to clear your session, including search history and login status?