GlobalView

Fulltext | Watters, Paul
Your search produced these results.

Showing items 1 - 15 of 35.

Add to Quick Collection   All 35 Results

Sort:
 Add All Items to Quick Collection
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/73771
Description: Aliases play an important role in online environments by facilitating anonymity, but also can be used to hide the identity of cybercriminals. Previous studies have investigated this alias matching pro... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/63717
Description: Authorship Analysis aims to extract information about the authorship of documents from features within those documents. Typically, this is performed as a classification task with the aim of identifyin... More
Full Text: Full Text
Reviewed: Reviewed
Image Thumbnail
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/36009
Description: Unsupervised Authorship Analysis (UAA) aims to cluster documents by authorship without knowing the authorship of any documents. An important factor in UAA is the method for calculating the distance be... More
Full Text: Full Text
Reviewed: Reviewed
Image Thumbnail
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/67206
Description: The steady growth of the Internet, sophisticated digital image processing technology, the cheap availability of storage devices and surfer's ever-increasing interest on images have been contributing t... More
Full Text: Full Text
Reviewed: Reviewed
Image Thumbnail
Date: 2013
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/57468
Description: With the advent of the Internet along with sophisticated digital image processing technology, the Internet quickly became the principal medium for the distribution of pornographic content favouring po... More
Full Text: Full Text
Reviewed: Reviewed
Image Thumbnail
Date: 2012
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/31923
Description: While social media is a new and exciting technology, it has the potential to be misused by organized crime groups and individuals involved in the illicit drugs trade. In particular, social media provi... More
Full Text: Full Text
Reviewed: Reviewed
Image Thumbnail
Date: 2012
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/66487
Description: Authorship attribution methods aim to determine the author of a document, by using information gathered from a set of documents with known authors. One method of performing this task is to create prof... More
Full Text: Full Text
Reviewed: Reviewed
Image Thumbnail
Date: 2012
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/66988
Description: Controlling the flow of sensitive data has been widely acknowledged as a critical aspect for securing web information systems. A common limitation of previous approaches for the implementation of the ... More
Full Text: Full Text
Image Thumbnail
Date: 2012
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/38296
Description: Authorship analysis on phishing websites enables the investigation of phishing attacks, beyond basic analysis. In authorship analysis, salient features from documents are used to determine properties ... More
Full Text: Full Text
Image Thumbnail
Date: 2011
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/69150
Description: The aim of the present article is to obtain a theoretical result essential for applications of combinatorial semigroups for the design of multiple classification systems in data mining. We consider a ... More
Full Text: Full Text
Reviewed: Reviewed
Image Thumbnail
Date: 2011
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/44407
Description: Cybersickness embraces a range of clinical symptoms reported in response to simulated motion in a computer generated, virtual reality environment. The Simulator Sickness Questionnaire (SSQ) has been t... More
Full Text: Full Text
Reviewed: Reviewed
Image Thumbnail
Date: 2011
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/69640
Description: Zero-day or unknown malware are created using code obfuscation techniques that can modify the parent code to produce offspring copies which have the same functionality but with different signatures. C... More
Full Text: Full Text
Image Thumbnail
Date: 2010
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/42030
Description: Rootkits refer to software that is used to hide the presence of malware from system/network administrators and permit an attacker to take control of a computer. In our previous work, we designed a sys... More
Full Text: Full Text
Image Thumbnail
Date: 2010
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/39945
Description: Authorship attribution is a growing field, moving from beginnings in linguistics to recent advances in text mining. Through this change came an increase in the capability of authorship attribution met... More
Full Text: Full Text
Reviewed: Reviewed
Image Thumbnail
Date: 2010
Type: Text
Identifier: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/43646
Description: Phishing fraudsters attempt to create an environment which looks and feels like a legitimate institution, while at the same time attempting to bypass filters and suspicions of their targets. This is a... More
Full Text: Full Text
Reviewed: Reviewed
Image Thumbnail