Your selections:
A new procedure to help system/network administrators identify multiple rootkit infections
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
A preliminary profiling of internet money mules : An Australian perspective
- Aston, Manny, McCombie, Stephen, Reardon, Ben, Watters, Paul
Authorship attribution for Twitter in 140 characters or less
- Layton, Robert, Watters, Paul, Dazeley, Richard
Automated unsupervised authorship analysis using evidence accumulation clustering
- Layton, Robert, Watters, Paul, Dazeley, Richard
Automatically determining phishing campaigns using the USCAP methodology
- Layton, Robert, Watters, Paul, Dazeley, Richard
Automatically generating classifier for phishing email prediction
- Ma, Liping, Torney, Rosemary, Watters, Paul, Brown, Simon
Data loss in the British government : A bounty of credentials for organised crime
Detecting illicit drugs on social media using Automated Social Media Intelligence Analysis (ASMIA)
Detecting phishing emails using hybrid features
- Ma, Liping, Ofoghi, Bahadorreza, Watters, Paul, Brown, Simon
Determining provenance in phishing websites using automated conceptual analysis
- Layton, Robert, Watters, Paul
Digital forensic techniques for static analysis of NTFS images
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Enabling access to British birth cohort studies: A secure web interface for the NSHD (SWIFT)
- Watters, Paul, Kuh, Diana, Latham, Susan, Garwood, Kevin, Shah, Imran
Establishing phishing provenance using orthographic features
- Liping, Ma, Yearwood, John, Watters, Paul
Estimating cybersickness of simulated motion using the Simulator Sickness Questionnaire (SSQ) : A controlled study
Evaluating authorship distance methods using the positive Silhouette coefficient
- Layton, Robert, Watters, Paul, Dazeley, Richard
Identifying rootkit infections using data mining
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
Illicit image detection : An MRF model based stochastic approach
- Islam, Mofakharul, Watters, Paul, Yearwood, John, Hussain, Mazher, Swarna, Lubaba
Illicit image detection using erotic pose estimation based on kinematic constraints
- Islam, Mofakharul, Watters, Paul, Yearwood, John, Hussain, Mazher, Swarna, Lubaba
Internet security applications of the Munn rings
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Abawajy, Jemal, Pan, L.
Local n-grams for author identification: Notebook for PAN at CLEF 2013 C3 - CEUR Workshop Proceedings
- Layton, Robert, Watters, Paul, Dazeley, Richard
Are you sure you would like to clear your session, including search history and login status?