Your selections:
Cybercrime attribution : An Eastern European case study
- McCombie, Stephen, Pieprzyk, Josef, Watters, Paul
The seven scam types: Mapping the terrain of cybercrime
- Stabek, Amber, Watters, Paul, Layton, Robert
Authorship attribution for Twitter in 140 characters or less
- Layton, Robert, Watters, Paul, Dazeley, Richard
Authorship attribution of IRC messages using inverse author frequency
- Layton, Robert, McCombie, Stephen, Watters, Paul
- Watters, Paul, Lueg, Christopher, Spiranovic, Caroline, Prichard, Jeremy
Malicious code detection using penalized splines on OPcode frequency
- Alazab, Mamoun, Al Kadiri, Mohammad, Venkatraman, Sitalakshmi, Al-Nemrat, Ameer
Analysis of firewall log-based detection scenarios for evidence in digital forensics
- Mukhtar, Rubiu, Al-Nemrat, Ameer, Alazab, Mamoun, Venkatraman, Sitalakshmi, Jahankhani, Hamid
Crime toolkits: The productisation of cybercrime
- Alazab, Ammar, Abawajy, Jemal, Hobbs, Michael, Layton, Robert, Khraisat, Ansam
Malicious Spam Emails Developments and Authorship Attribution
- Alazab, Mamoun, Layton, Robert, Broadhurst, Roderic, Bouhours, Brigitte
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?
- Watters, Paul, Herps, Aaron, Layton, Robert, McCombie, Stephen
Trends in Crime Toolkit Development
- Khraisat, Ansam, Alazab, Ammar, Hobbs, Michael, Abawajy, Jemal, Azab, Ahmad
Mining malware to detect variants
- Azab, Ahmad, Layton, Robert, Alazab, Mamoun, Oliver, Jonathan
Are you sure you would like to clear your session, including search history and login status?