Author:
Rowe Neil C.,Rrushi Julian
Publisher
Springer International Publishing
Reference18 articles.
1. Afroz S, Brennan M, Greenstadt R (2012) Detecting hoaxes, frauds, and deception in online writing style. In: Proceedings of IEEE symposium on security and privacy, Oakland, CA, pp 461–475
2. Altheide C, Carvey H (2011) Digital forensics with open source tools. Syngress, Waltham MA, US
3. Amore A (2015) The art of the con: the most notorious fakes, frauds, and forgeries in the art world. St. Martin’s, New York
4. Bowen B, Hershkop S, Keromytis A, Stolfo SJ (2009) Baiting inside attackers using decoy documents. Proceedings of the ICST conference on security and privacy in communication networks Athens, Greece, September, paper 19
5. Dang B, Gazet A, Bachaalany E, Josse S (2014) Practical reverse engineering: x86, x64, ARM, Windows kernel, reversing tools, and obfuscation. Wiley, New York