Your selections:
Digital forensic techniques for static analysis of NTFS images
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
A preliminary profiling of internet money mules : An Australian perspective
- Aston, Manny, McCombie, Stephen, Reardon, Ben, Watters, Paul
Skype Traffic Classification Using Cost Sensitive Algorithms
- Azab, Azab, Layton, Robert, Alazab, Mamoun, Watters, Paul
API based discrimination of ransomware and benign cryptographic programs
- Black, Paul, Sohail, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder, Vamplew, Peter, Watters, Paul
Estimating cybersickness of simulated motion using the Simulator Sickness Questionnaire (SSQ) : A controlled study
Measuring Surveillance in Online Advertising: A Big Data Approach
- Herps, Aaron, Watters, Paul, Pineda-Villavicencio, Guillermo
Using differencing to increase distinctiveness for phishing website clustering
- Layton, Robert, Brown, Simon, Watters, Paul
Determining provenance in phishing websites using automated conceptual analysis
- Layton, Robert, Watters, Paul
Automatically determining phishing campaigns using the USCAP methodology
- Layton, Robert, Watters, Paul, Dazeley, Richard
Authorship attribution for Twitter in 140 characters or less
- Layton, Robert, Watters, Paul, Dazeley, Richard
Indirect information linkage for OSINT through authorship analysis of aliases
- Layton, Robert, Perez, Charles, Birregah, Babiga, Watters, Paul, Lemercier, Marc
Identifying Faked Hotel Reviews Using Authorship Analysis
- Layton, Robert, Watters, Paul, Ureche, Oana
Establishing phishing provenance using orthographic features
- Liping, Ma, Yearwood, John, Watters, Paul
RBACS : Rootkit behavioral analysis and classification system
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
A new procedure to help system/network administrators identify multiple rootkit infections
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
Identifying rootkit infections using data mining
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
Automatically generating classifier for phishing email prediction
- Ma, Liping, Torney, Rosemary, Watters, Paul, Brown, Simon
Detecting phishing emails using hybrid features
- Ma, Liping, Ofoghi, Bahadorreza, Watters, Paul, Brown, Simon
Are you sure you would like to clear your session, including search history and login status?