Zero-day malware detection based on supervised learning algorithms of API call signatures
Windows rootkits: Attacks and countermeasures
The seven scam types: Mapping the terrain of cybercrime
Authorship attribution for Twitter in 140 characters or less
Detecting phishing emails using hybrid features
A preliminary profiling of internet money mules : An Australian perspective
Automatically determining phishing campaigns using the USCAP methodology
Are you sure you would like to clear your session, including search history and login status?