http://researchonline.federation.edu.au/vital/access/manager/Index ${session.getAttribute("locale")} 5 ICANN or ICANT: Is WHOIS an Enabler of Cybercrime? http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5894 Wed 07 Apr 2021 13:45:28 AEST ]]> A methodology for analyzing the credential marketplace http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5093 Wed 07 Apr 2021 13:44:42 AEST ]]> Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP) http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5094 Wed 07 Apr 2021 13:44:42 AEST ]]> Authorship attribution of IRC messages using inverse author frequency http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4965 Wed 07 Apr 2021 13:44:33 AEST ]]> Cybercrime attribution : An Eastern European case study http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3669 Wed 07 Apr 2021 13:34:40 AEST ]]> A preliminary profiling of internet money mules : An Australian perspective http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3554 Wed 07 Apr 2021 13:34:32 AEST ]]>