Your selections:
Cybercrime attribution : An Eastern European case study
- McCombie, Stephen, Pieprzyk, Josef, Watters, Paul
Authorship attribution of IRC messages using inverse author frequency
- Layton, Robert, McCombie, Stephen, Watters, Paul
A methodology for analyzing the credential marketplace
- Watters, Paul, McCombie, Stephen
Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP)
- Watters, Paul, McCombie, Stephen, Layton, Robert, Pieprzyk, Josef
ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?
- Watters, Paul, Herps, Aaron, Layton, Robert, McCombie, Stephen
Are you sure you would like to clear your session, including search history and login status?