REPLOT : REtrieving Profile Links on Twitter for malicious campaign discovery
Local n-grams for author identification: Notebook for PAN at CLEF 2013 C3 - CEUR Workshop Proceedings
Digital forensic techniques for static analysis of NTFS images
Zero-day malware detection based on supervised learning algorithms of API call signatures
Enabling access to British birth cohort studies: A secure web interface for the NSHD (SWIFT)
Towards understanding malware behaviour by the extraction of API calls
Optimization of classifiers for data mining based on combinatorial semigroups
Are you sure you would like to clear your session, including search history and login status?