Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
53 | Leonard Kwan, Pradeep Ray, Greg Stephens |
Towards a Methodology for Profiling Cyber Criminals. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Jim A. M. Schiks, Steve G. A. van de Weijer, Eric Rutger Leukfeldt |
High tech crime, high intellectual crime? Comparing the intellectual capabilities of cybercriminals, traditional criminals and non-criminals. |
Comput. Hum. Behav. |
2022 |
DBLP DOI BibTeX RDF |
|
50 | Chao Zhang 0049, Shahrzad Gholami, Debarun Kar, Arunesh Sinha, Manish Jain, Ripple Goyal, Milind Tambe |
Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals. |
Games |
2016 |
DBLP DOI BibTeX RDF |
|
50 | Chao Zhang 0049, Arunesh Sinha, Milind Tambe |
Keeping Pace with Criminals: Designing Patrol Allocation Against Adaptive Opportunistic Criminals. |
AAMAS |
2015 |
DBLP BibTeX RDF |
|
42 | Abdul Nasir |
Use of ICT: a step towards good governance in developing countries. |
ICEGOV |
2007 |
DBLP DOI BibTeX RDF |
courts, prisoner, video trial, ICT, good governance |
42 | Jeroen S. de Bruin, Tim K. Cocx, Walter A. Kosters, Jeroen F. J. Laros, Joost N. Kok |
Data Mining Approaches to Criminal Career Analysis. |
ICDM |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Elias Levy |
Criminals Become Tech Savvy. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
|
36 | John F. Banzhaf |
When your computer needs a lawyer. |
Commun. ACM |
1968 |
DBLP DOI BibTeX RDF |
constacts, criminals, evidence copying, income tax, lawyer, liabilty, negligence, record keeping records, slander of credit, standard of care, torts, warrantees, simulation, accounting, regulations, copyrights, evidence, law, patents, legal, copying, guarantees, crime, trade secrets |
28 | Ayaz Khan, Uffe Kock Wiil, Nasrullah Memon |
Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National Level. |
SADFE |
2010 |
DBLP DOI BibTeX RDF |
Cyber Laws, Electronic Devices, Digital Forensics, Digital Evidence, Forensic Analysis |
28 | Heum Park, SunHo Cho, Hyuk-Chul Kwon |
Cyber Forensics Ontology for Cyber Criminal Investigation. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
criminal investigation, cyber forensics, ontology, digital evidence, cyber crime |
28 | Chetan Parampalli, R. Sekar 0001, Rob Johnson |
A practical mimicry attack against powerful system-call monitors. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack |
28 | Greg Aaron, Katharine A. Bostik, Rod Rasmussen, Edmon Chung |
Protecting the web: phishing, malware, and other security threats. |
WWW |
2008 |
DBLP DOI BibTeX RDF |
security, dns |
28 | Vasco Furtado, Adriano Melo, André L. V. Coelho, Ronaldo Menezes |
A crime simulation model based on social networks and swarm intelligence. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
application for law enforcement, social networks, swarm intelligence, multiagent simulation |
28 | Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen |
Authorship Analysis in Cybercrime Investigation. |
ISI |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng |
Criminal Record Matching Based on the Vector Space Model. |
ISI |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Yifei Xue, Donald E. Brown |
Decision Based Spatial Analysis of Crime. |
ISI |
2003 |
DBLP DOI BibTeX RDF |
Spatial choice, preference specification, feature selection, model-based clustering |
28 | Anil K. Jain 0001, Sharath Pankanti, Salil Prabhakar, Arun Ross |
Recent Advances in Fingerprint Verification. |
AVBPA |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Eric R. Verheul, Henk C. A. van Tilborg |
Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
Traceable ElGamal, Key Recovery, Key Escrow, ElGamal |
25 | Joanna Sooknanan, Terence A. R. Seemungal |
Criminals and their models - a review of epidemiological models describing criminal behaviour. |
Appl. Math. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Mohamed Fazil Mohamed Firdhous, Walid Elbreiki, Ibrahim Abdullahi, B. H. Sudantha, Rahmat Budiarto |
WormGPT: A Large Language Model Chatbot for Criminals. |
ACIT |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Jeongheun Yeon, Jong Ho Jhee, Hyunjung Shin |
Latent Inter-relation Augment between Crimes and Criminals using Factorization Machines. |
BigComp |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Olumide Malomo, Shanzhen Gao, Adeyemi A. Adekoya, Ephrem Eyob, Weizheng Gao |
Cyber-Criminals Metrics Engine for Attack Determination on Web Technologies Platforms. |
CSCI |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Md. Atiqur Rahman, A. B. M. Alim Al Islam |
Cri-Astrologer: Predicting Demography of Involved Criminals based on Historical Data. |
NSysS |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Richard Hughes |
Smart plugs invite cyber criminals into the home. |
Netw. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Friedel Bolle |
Deterrence by Collective Punishment May Work against Criminals but Never against Freedom Fighters. |
Games |
2021 |
DBLP DOI BibTeX RDF |
|
25 | David B. Skillicorn, Christian Leuprecht |
Copresence networks: criminals in their environment. |
Soc. Netw. Anal. Min. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Ninni Ylönen, Matti Rissanen, Antti Ylä-Kujala, Tiina Sinkkonen, Salla Marttonen-Arola, David Baglee, Timo Kärri |
A web of clues: can ecosystems be profiled similarly to criminals? |
Int. J. Netw. Virtual Organisations |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Muharman Lubis, Afrizal Rizky Putra Pamungkas, Deden Witarsyah Jacob, Al-Khowarizmi, Arif Ridho Lubis |
User Experience Design in E-Consultation on General Legal Criminals: The Utilization of Alternative Design. |
ICECC |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Nicksson Ckayo Arrais de Freitas, Ticiana L. Coelho da Silva, José Antônio Fernandes de Macêdo, Luís César M. de Vasconcelos, Francisco C. F. Nunes Junior |
Crime Monitor: Monitoring Criminals from Trajectory Data. |
MDM |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Shuyi Wei, Lailong Yang, Xiuxia Zhang |
Design of the Face Recognition System for Criminals in Taxi Based on Cloud Platform. |
ICAIIS |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Yu-Jun Zheng 0001, Yi-Chen Du, Hai-Feng Ling, Weiguo Sheng, Sheng-Yong Chen |
Evolutionary Collaborative Human-UAV Search for Escaped Criminals. |
IEEE Trans. Evol. Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Andrea Tundis, Leon Böck, Victoria Stanilescu, Max Mühlhäuser |
Experiencing the Detection of Radicalized Criminals on Facebook Social Network and Data-related Issues. |
J. Cyber Secur. Mobil. |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Andrea Tundis, Humayun Kaleem, Max Mühlhäuser |
Detecting and Tracking Criminals in the Real World through an IoT-Based System. |
Sensors |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Aleksandra Pawlicka, Michal Choras, Marek Pawlicki |
Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective. |
ARES |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Jieun Dokko, Michael Shin, Soo Young Park |
An Intelligence Criminal Tracker for Industrial Espionage - Applying Digital Data Acquired Onsite to Target Criminals. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Danish Wadood, Azhar Rauf, Shah Khusro, Shaukat Ali 0002 |
Identifying key influential parameters of high profile criminals through statistical correlation. |
Clust. Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Andrea Tundis, Leon Böck, Victoria Stanilescu, Max Mühlhäuser |
Limits in the data for detecting criminals on social media. |
ARES |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Hugo L. J. Bijmans, Tim M. Booij, Christian Doerr |
Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale. |
USENIX Security Symposium |
2019 |
DBLP BibTeX RDF |
|
25 | Youzhi Zhang 0001, Qingyu Guo, Bo An 0001, Long Tran-Thanh, Nicholas R. Jennings |
Optimal Interdiction of Urban Criminals with the Aid of Real-Time Information. |
AAAI |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Yajie Su, Hao Lu, Hongzhou Zhang |
Qualitative Mapping Modeling of Criminals' Sense of Security in Theft Cases. |
IEEE BigData |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Andrea Tundis, Archit Jain, Gaurav Bhatia, Max Mühlhäuser |
Similarity Analysis of Criminals on Social Networks: An Example on Twitter. |
ICCCN |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Yanan Zhao, Mingchu Li, Cheng Guo 0001 |
Developing Patrol Strategies for the Cooperative Opportunistic Criminals. |
ICA3PP (1) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Erik Van De Sandt |
Deviant security: the technical computer security practices of cyber criminals. |
|
2019 |
RDF |
|
25 | Jason R. C. Nurse |
Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
25 | Adriana Baltaretu, Craig G. Chambers |
When criminals blow up... balloons. Associative and combinatorial information in the generation of on-line predictions in language. |
CogSci |
2018 |
DBLP BibTeX RDF |
|
25 | Worawut Yimyam, Thidarat Pinthong, Narumol Chumuang, Mahasak Ketcham |
Face Detection Criminals through CCTV Cameras. |
SITIS |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Pablo Moriano, Soumya Achar, L. Jean Camp |
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. |
Comput. Secur. |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Christian Janze |
Are Cryptocurrencies Criminals Best Friends? Examining the Co-Evolution of Bitcoin and Darknet Markets. |
AMCIS |
2017 |
DBLP BibTeX RDF |
|
25 | Mohammed Alzaabi, Kamal Taha, Thomas Anthony Martin |
CISRI: A Crime Investigation System Using the Relative Importance of Information Spreaders in Networks Depicting Criminals Communications. |
IEEE Trans. Inf. Forensics Secur. |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Alan Brill |
The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Chao Zhang |
Modeling, Learning and Defending against Opportunistic Criminals in Urban Areas: (Doctoral Consortium). |
AAMAS |
2015 |
DBLP BibTeX RDF |
|
25 | Mark Lowe |
Defending against cyber-criminals targeting business websites. |
Netw. Secur. |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Chao Zhang 0049, Albert Xin Jiang, Martin B. Short, P. Jeffrey Brantingham, Milind Tambe |
Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms. |
GameSec |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Changjun Fan, Kaiming Xiao, Bao-Xin Xiu, Guodong Lv |
A fuzzy clustering algorithm to detect criminals without prior information. |
ASONAM |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Edwin M. Agwu |
Cyber Criminals on the Internet Super Highways: A Technical Investigation of Different Shades and Colours within the Nigerian Cyber Space. |
Int. J. Online Mark. |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Gabi Kedma, Mordechai Guri, Tom Sela, Yuval Elovici |
Analyzing users' web surfing patterns to trace terrorists and criminals. |
ISI |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Michael A. Zarro, Catherine Hall, Andrea Forte |
Wedding Dresses and Wanted Criminals: Pinterest.com as an Infrastructure for Repository Building. |
ICWSM |
2013 |
DBLP BibTeX RDF |
|
25 | Roman Beck |
Interview with Peter Tauber on "Internet Anonymity: Human Right or Protection for Criminals?". |
Bus. Inf. Syst. Eng. |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Kim Barker |
Cyber Criminals on Trial, by Russell G Smith, Peter Grabosky and Gregor Urbas. |
Int. J. Law Inf. Technol. |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Shah Mahmood, Yvo Desmedt |
Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract). |
RAID |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Paul Elzinga |
Can Concepts Reveal Criminals? |
ICFCA |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Shui Yu 0001, Wanlei Zhou 0001, Wanchun Dou, S. Kami Makki |
Why it is Hard to Fight against Cyber Criminals? |
ICDCS Workshops |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Jeff Hudson |
Weaponised malware: how criminals use digital certificates to cripple your organisation. |
Netw. Secur. |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Anil K. Jain 0001, Brendan Klare |
Matching Forensic Sketches and Mug Shots to Apprehend Criminals. |
Computer |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Yaniv Altshuler, Nadav Aharony, Alex Pentland, Yuval Elovici, Manuel Cebrián |
Stealing Reality: When Criminals Become Data Scientists (or Vice Versa). |
IEEE Intell. Syst. |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Jason Bennett Thatcher, Terry Leap, Ryan T. Wright |
Old Wine in New Bottles: Investigating how Information Technology is Enabling "Old Criminals" to access "New Venues". |
AMCIS |
2010 |
DBLP BibTeX RDF |
|
25 | Charlie D. Frowd, Peter J. B. Hancock, Vicki Bruce, Alex H. McIntyre, Melanie Pitchford, Rebecca Atkins, Andrew Webster, John Pollard, Beverley Hunt, Emma Price, Sandra Morgan, Adrian Stoica, Romeo Dughila, Sergiu Maftei, Gabriel Sendrea |
Giving Crime the 'evo': Catching Criminals Using EvoFIT Facial Composites. |
EST |
2010 |
DBLP DOI BibTeX RDF |
|
25 | ZhengYou Xia |
Fighting criminals: Adaptive inferring and choosing the next investigative objects in the criminal network. |
Knowl. Based Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Ellen Belcher, Ellen Sexton |
Digitizing criminals: web delivery of a century on the cheap. |
OCLC Syst. Serv. |
2008 |
DBLP DOI BibTeX RDF |
|
25 | K. S. Kong, E. Y. K. Ng |
An integrated software tool for detecting criminals using DNA databases. |
J. Comput. Methods Sci. Eng. |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Richard Bache, Fabio Crestani |
Estimating real-valued characteristics of criminals from their recorded crimes. |
CIKM |
2008 |
DBLP DOI BibTeX RDF |
crime data, offender profiling, data mining, language modelling, bayesian analysis |
25 | Kamal Dahbur, Thomas Muscarello |
Systematic Identification of Potential Patterns for Serial Criminals. |
Int. J. Comput. Their Appl. |
2004 |
DBLP BibTeX RDF |
|
25 | Yifei Xue, Donald E. Brown |
A decision model for spatial site selection by criminals: a foundation for law enforcement decision support. |
IEEE Trans. Syst. Man Cybern. Part C |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Donald E. Brown, Louise F. Gunderson |
Using Data Mining to Discover the Preferences of Computer Criminals. |
Adv. Comput. |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Donald E. Brown, Louise F. Gunderson |
Using clustering to discover the preferences of computer criminals . |
IEEE Trans. Syst. Man Cybern. Part A |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Donald E. Brown |
The Regional Crime Analysis Program (ReCAP): a framework for mining data to catch criminals. |
SMC |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Donn B. Parker |
Security as the Target of Criminals. |
Inf. Secur. J. A Glob. Perspect. |
1996 |
DBLP DOI BibTeX RDF |
|
25 | Lawrence F. Young |
Utopians, Cyberpunks, Players, and Other Computer Criminals: Deterrence and the Law. |
Security and Control of Information Technology in Society |
1993 |
DBLP BibTeX RDF |
|
25 | David Bellin |
High school hackers: heroes or criminals? |
SIGCAS Comput. Soc. |
1985 |
DBLP DOI BibTeX RDF |
|
25 | Jay Bloom Becker |
Who are the computer criminals? |
SIGCAS Comput. Soc. |
1982 |
DBLP DOI BibTeX RDF |
|
14 | Farkhund Iqbal, Liaquat A. Khan, Benjamin C. M. Fung, Mourad Debbabi |
e-mail authorship verification for forensic investigation. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
e-mail forensics, stylometric features, classification, regression, cyber crimes |
14 | Robert Willison, Mikko T. Siponen |
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Alexander Gutfraind, Aric A. Hagberg, Feng Pan 0005 |
Optimal Interdiction of Unreactive Markovian Evaders. |
CPAIOR |
2009 |
DBLP DOI BibTeX RDF |
|
14 | M. Eric Johnson |
Data Hemorrhages in the Health-Care Sector. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Health-care information, data leaks, security, identity theft |
14 | Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval |
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. |
HCI (16) |
2009 |
DBLP DOI BibTeX RDF |
counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks |
14 | Patrick Perrot, Mathieu Morel, Joseph Razik, Gérard Chollet |
Vocal Forgery in Forensic Sciences. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
disguised voices, identification, SVM classifier, voice conversion |
14 | Tossapon Boongoen, Qiang Shen 0001 |
Intelligent hybrid approach to false identity detection. |
ICAIL |
2009 |
DBLP DOI BibTeX RDF |
false identity detection, terrorist data, link analysis, hybrid algorithm |
14 | Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani |
PhishCatch - A Phishing Detection Tool. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Ali Saglam, Alptekin Temizel |
Real-Time Adaptive Camera Tamper Detection for Video Surveillance. |
AVSS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Mazleena Salleh, Teoh Chin Yew |
Application of 2D Barcode in Hardcopy Document Verification System. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
hardcopy document, verification, integrity |
14 | Amin Milani Fard, Martin Ester |
Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery. |
CSE (4) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Robert Koch 0002, Gabi Dreo |
Fast Learning Neural Network Intrusion Detection System. (PDF / PS) |
AIMS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Christian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch |
Measurement Study on Malicious Web Servers in the .nz Domain. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Svend Rothmann Bonde, Lise Vestergaard Jensen, Emil Sellström, Stephan Suesmann |
Draw poker. |
SIGGRAPH ASIA Animations |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Peter Phillips 0001, Ickjai Lee |
Criminal Cross Correlation Mining and Visualization. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils, Daniele Perito |
Geolocalization of proxied services and its application to fast-flux hidden servers. |
Internet Measurement Conference |
2009 |
DBLP DOI BibTeX RDF |
fast-flux, hidden servers, geolocalization |
14 | Xiaozheng Zhang 0002, Yongsheng Gao 0001, Maylor K. H. Leung |
Recognizing Rotated Faces From Frontal and Side Views: An Approach Toward Effective Use of Mugshot Databases. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen |
Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan. |
Intelligence and Security Informatics |
2008 |
DBLP DOI BibTeX RDF |
Forum-based Community, Gray Web Forum, Forum Analysis & Investigation, Crime Lead Discovering, Content Analysis |
14 | Zbigniew Gomolka, Tomasz Lewandowski |
The Biometric Signals Processing. |
Computer Recognition Systems 2 |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Chun Wei, Alan P. Sprague, Gary Warner, Anthony Skjellum |
Mining spam email to identify common origins for forensic application. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
data mining, spam, electronic mail, forensic analysis, cyber crime |