1. User authentication from web browsing behavior;Abramson,2013
2. Exponential distribution: theory, methods and applications;Balakrishnan,1996
3. Dupless: server-aided encryption for duplicated storage;Bellare,2013
4. Adversarial stylometry: circumventing authorship recognition to preserve privacy and anonymity;Brennan;ACM Trans Inf Syst Secur,2012
5. Advances in artificial immune systems;Dasgupta;IEEE Comput Intell Mag,2006