Your selections:
Zero-day malware detection based on supervised learning algorithms of API call signatures
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz
Identity crime : The challenges in the regulation of identity crime
The importance of mandatory data breach notification to identity crime
- Holm, Eric, Mackenzie, Geraldine
Authorship analysis of the zeus botnet source code
Windows rootkits: Attacks and countermeasures
- Lobo, Desmond, Watters, Paul, Wu, Xin, Sun, Li
The seven scam types: Mapping the terrain of cybercrime
- Stabek, Amber, Watters, Paul, Layton, Robert
Understanding victims of identity theft: Preliminary insights
- Turville, Kylie, Yearwood, John, Miller, Charlynn
A survey on latest botnet attack and defense
- Zhang, Lei, Yu, Shui, Wu, Di, Watters, Paul
Are you sure you would like to clear your session, including search history and login status?