Your selections:
Digital forensic techniques for static analysis of NTFS images
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Towards automatic image segmentation using optimised region growing technique
- Nicholson, Ann, Li, Xiaodong, Alazab, Mamoun, Islam, Mofakharul, Venkatraman, Sitalakshmi
Towards understanding and improving E-government strategies in Jordan
- Alkhaleefah, Mohammad, Alkhawaldeh, Mahmoud, Venkatraman, Sitalakshmi, Alazab, Mamoun
Skype Traffic Classification Using Cost Sensitive Algorithms
- Azab, Azab, Layton, Robert, Alazab, Mamoun, Watters, Paul
Malicious Spam Emails Developments and Authorship Attribution
- Alazab, Mamoun, Layton, Robert, Broadhurst, Roderic, Bouhours, Brigitte
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
Mining malware to detect variants
- Azab, Ahmad, Layton, Robert, Alazab, Mamoun, Oliver, Jonathan
- Chen, Qian, Yao, Lin, Wu, Yulin, Wang, Xuan, Zhang, Weizhe, Jiang, Zoe, Liu, Yang, Alazab, Mamoun
Are you sure you would like to clear your session, including search history and login status?