1. Doppelgänger finder: taking stylometry to the underground;Afroz,2014
2. Identification and detection of phishing emails using natural language processing techniques;Aggarwal,2014
3. CISOs and organisational culture: their own worst enemy?;Ashenden;Comp Sec,2013
4. Activity profiles in online social media;Atig,2014
5. Undermining-social engineering using open source intelligence gathering;Ball,2012