Your selections:
Authorship analysis of aliases: Does topic influence accuracy?
- Layton, Robert, Watters, Paul, Dazeley, Richard
Automated unsupervised authorship analysis using evidence accumulation clustering
- Layton, Robert, Watters, Paul, Dazeley, Richard
Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP)
- Watters, Paul, McCombie, Stephen, Layton, Robert, Pieprzyk, Josef
Evaluating authorship distance methods using the positive Silhouette coefficient
- Layton, Robert, Watters, Paul, Dazeley, Richard
How much material on BitTorrent is infringing content? A case study
- Watters, Paul, Layton, Robert, Dazeley, Richard
Optimization based clustering algorithms for authorship analysis of phishing emails
- Seifollahi, Sattar, Bagirov, Adil, Layton, Robert, Gondal, Iqbal
Recentred local profiles for authorship attribution
- Layton, Robert, Watters, Paul, Dazeley, Richard
REPLOT : REtrieving Profile Links on Twitter for malicious campaign discovery
- Perez, Charles, Birregah, Babiga, Layton, Robert, Lemercier, Marc, Watters, Paul
The role of love stories in Romance Scams : A qualitative analysis of fraudulent profiles
- Kopp, Christian, Layton, Robert, Sillitoe, Jim, Gondal, Iqbal
Using stereotypes to improve early-match poker play
- Layton, Robert, Vamplew, Peter, Turville, Christopher
Are you sure you would like to clear your session, including search history and login status?