Refreshing results…
From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods
Download from doi.orgMitigating Circumstances in Cybercrime: a Position Paper
Download from eprints.bournemouth.ac.ukLanguage-independent gender identification through keystroke analysis
Download from www.researchgate.netA critical review of 7 years of Mobile Device Forensics
Download from www.icsd.aegean.grThe SPHINX enigma in critical VoIP infrastructures: Human or botnet?
Download from www.researchgate.netOn-scene Triage open source forensic tool chests: Are they effective?
Download from www.researchgate.netMacroeconomics of privacy and security for identity management and surveillance
Download from www.researchgate.netKeystroke forensics: are you typing on a desktop or a laptop?
Download from www.researchgate.netAn integrated model for online transactions: Illuminating the black box
Download from www.researchgate.netReal time DDoS detection using fuzzy estimators
Download from www.researchgate.netOn the User Acceptance of Graphical Passwords
Download from www.researchgate.netUser-centric, privacy-preserving adaptation for voIP CAPTCHA challenges
Download from www.researchgate.netA framework for password harvesting from volatile memory
Download from www.researchgate.netAuthenticated Key Exchange (AKE) in Delay Tolerant Networks
Download from link.springer.comPractical Password Harvesting from Volatile Memory
Download from www.researchgate.netMissing publications? Search for publications with a matching author name.