http://researchonline.federation.edu.au/vital/access/manager/Index ${session.getAttribute("locale")} 5 Mining malware secrets http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:13693 Wed 07 Apr 2021 14:01:48 AEST ]]> Authorship analysis of the zeus botnet source code http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:10306 Wed 07 Apr 2021 13:55:39 AEST ]]> The importance of mandatory data breach notification to identity crime http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:7534 Wed 07 Apr 2021 13:46:59 AEST ]]> Zero-day malware detection based on supervised learning algorithms of API call signatures http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4828 Wed 07 Apr 2021 13:44:22 AEST ]]> Identity crime : The challenges in the regulation of identity crime http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4771 Wed 07 Apr 2021 13:44:18 AEST ]]> A survey on latest botnet attack and defense http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4597 Wed 07 Apr 2021 13:44:05 AEST ]]> The seven scam types: Mapping the terrain of cybercrime http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3844 Wed 07 Apr 2021 13:34:54 AEST ]]> Understanding victims of identity theft: Preliminary insights http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3848 Wed 07 Apr 2021 13:34:54 AEST ]]> Windows rootkits: Attacks and countermeasures http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3834 Wed 07 Apr 2021 13:34:53 AEST ]]>