Your selections:
Authorship attribution for Twitter in 140 characters or less
- Layton, Robert, Watters, Paul, Dazeley, Richard
Automatically determining phishing campaigns using the USCAP methodology
- Layton, Robert, Watters, Paul, Dazeley, Richard
Establishing reasoning communities of security experts for Internet Commerce Security
- Kelarev, Andrei, Brown, Simon, Watters, Paul, Wu, Xinwen, Dazeley, Richard
How much material on BitTorrent is infringing content? A case study
- Watters, Paul, Layton, Robert, Dazeley, Richard
Recentred local profiles for authorship attribution
- Layton, Robert, Watters, Paul, Dazeley, Richard
Unsupervised authorship analysis of phishing webpages
- Layton, Robert, Watters, Paul, Dazeley, Richard
Authorship analysis of aliases: Does topic influence accuracy?
- Layton, Robert, Watters, Paul, Dazeley, Richard
Automated unsupervised authorship analysis using evidence accumulation clustering
- Layton, Robert, Watters, Paul, Dazeley, Richard
Evaluating authorship distance methods using the positive Silhouette coefficient
- Layton, Robert, Watters, Paul, Dazeley, Richard
Local n-grams for author identification: Notebook for PAN at CLEF 2013 C3 - CEUR Workshop Proceedings
- Layton, Robert, Watters, Paul, Dazeley, Richard
Rapid anomaly detection using integrated prudence analysis (IPA)
- Maruatona, Omaru, Vamplew, Peter, Dazeley, Richard, Watters, Paul
Are you sure you would like to clear your session, including search history and login status?