Your selections:
Information security governance: The art of detecting hidden malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Illicit image detection : An MRF model based stochastic approach
- Islam, Mofakharul, Watters, Paul, Yearwood, John, Hussain, Mazher, Swarna, Lubaba
Illicit image detection using erotic pose estimation based on kinematic constraints
- Islam, Mofakharul, Watters, Paul, Yearwood, John, Hussain, Mazher, Swarna, Lubaba
- Islam, Mofakharul, Watters, Paul
Establishing reasoning communities of security experts for Internet Commerce Security
- Kelarev, Andrei, Brown, Simon, Watters, Paul, Wu, Xinwen, Dazeley, Richard
Are you sure you would like to clear your session, including search history and login status?