Your selections:
Digital forensic techniques for static analysis of NTFS images
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Towards understanding malware behaviour by the extraction of API calls
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Zero-day malware detection based on supervised learning algorithms of API call signatures
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz
A preliminary profiling of internet money mules : An Australian perspective
- Aston, Manny, McCombie, Stephen, Reardon, Ben, Watters, Paul
Estimating cybersickness of simulated motion using the Simulator Sickness Questionnaire (SSQ) : A controlled study
The factor structure of cybersickness
Illicit image detection : An MRF model based stochastic approach
- Islam, Mofakharul, Watters, Paul, Yearwood, John, Hussain, Mazher, Swarna, Lubaba
Illicit image detection using erotic pose estimation based on kinematic constraints
- Islam, Mofakharul, Watters, Paul, Yearwood, John, Hussain, Mazher, Swarna, Lubaba
Security and blockchain convergence with internet of multimedia things : current trends, research challenges and future directions
- Jan, Mian, Cai, Jinjin, Gao, Xiang-Chuan, Khan, Fazlullah, Mastorakis, Spyridon, Usman, Muhammad, Alazab, Mamoun, Watters, Paul
Rees matrix constructions for clustering of data
- Kelarev, Andrei, Watters, Paul, Yearwood, John
Optimization of classifiers for data mining based on combinatorial semigroups
- Kelarev, Andrei, Yearwood, John, Watters, Paul
Internet security applications of the Munn rings
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Abawajy, Jemal, Pan, L.
Determining provenance in phishing websites using automated conceptual analysis
- Layton, Robert, Watters, Paul
Automatically determining phishing campaigns using the USCAP methodology
- Layton, Robert, Watters, Paul, Dazeley, Richard
Authorship attribution for Twitter in 140 characters or less
- Layton, Robert, Watters, Paul, Dazeley, Richard
Evaluating authorship distance methods using the positive Silhouette coefficient
- Layton, Robert, Watters, Paul, Dazeley, Richard
Unsupervised authorship analysis of phishing webpages
- Layton, Robert, Watters, Paul, Dazeley, Richard
Local n-grams for author identification: Notebook for PAN at CLEF 2013 C3 - CEUR Workshop Proceedings
- Layton, Robert, Watters, Paul, Dazeley, Richard
Authorship analysis of aliases: Does topic influence accuracy?
- Layton, Robert, Watters, Paul, Dazeley, Richard
Are you sure you would like to clear your session, including search history and login status?