Author:
Alazab Mamoun,Broadhurst Roderic
Reference49 articles.
1. Detecting malicious behaviour using supervised learning algorithms of the function calls;M Alazab;International Journal of Electronic Security and Digital Forensics,2013
2. Measuring the Cost of Cybercrime;R Anderson;The Economics of Information Security and Privacy IV,2013
3. Spam, Spam, Spam, Spam, Spam, the FTC, and Spam
4. Developments in the global law enforcement of cyber-crime;R Broadhurst;Policing: an International Journal of Police Strategies and Management,2006
5. Aboriginal sovereignty, ‘crime’ and criminology
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Detection of Cyber Attacks in Network Using ML;International Journal of Scientific Research in Science and Technology;2023-03-01
2. Spam Email Filtering using Machine Learning Algorithm;2023 7th International Conference on Computing Methodologies and Communication (ICCMC);2023-02-23
3. A review of spam email detection: analysis of spammer strategies and the dataset shift problem;Artificial Intelligence Review;2022-05-11
4. Detection of P2P Botnets and Creating Smart Grids using Machine Learning and Structured Graph Analysis;2022 6th International Conference on Computing Methodologies and Communication (ICCMC);2022-03-29
5. Spam Emails Detection Based on Distributed Word Embedding with Deep Learning;Studies in Computational Intelligence;2020-12-15