Your selections:
Young people, child pornography, and subcultural norms on the Internet
- Prichard, Jeremy, Spiranovic, Caroline, Watters, Paul, Lueg, Christopher
A survey on latest botnet attack and defense
- Zhang, Lei, Yu, Shui, Wu, Di, Watters, Paul
Skype Traffic Classification Using Cost Sensitive Algorithms
- Azab, Azab, Layton, Robert, Alazab, Mamoun, Watters, Paul
Measuring Surveillance in Online Advertising: A Big Data Approach
- Herps, Aaron, Watters, Paul, Pineda-Villavicencio, Guillermo
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
Identifying Faked Hotel Reviews Using Authorship Analysis
- Layton, Robert, Watters, Paul, Ureche, Oana
ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?
- Watters, Paul, Herps, Aaron, Layton, Robert, McCombie, Stephen
Are you sure you would like to clear your session, including search history and login status?