Security and blockchain convergence with internet of multimedia things : current trends, research challenges and future directions
REPLOT : REtrieving Profile Links on Twitter for malicious campaign discovery
Automated unsupervised authorship analysis using evidence accumulation clustering
Evaluating authorship distance methods using the positive Silhouette coefficient
Illicit image detection : An MRF model based stochastic approach
Illicit image detection using erotic pose estimation based on kinematic constraints
Local n-grams for author identification: Notebook for PAN at CLEF 2013 C3 - CEUR Workshop Proceedings
Are you sure you would like to clear your session, including search history and login status?