1. Are we missing labels? A study of the availability of ground-truth in network security research;Abt,2014
2. A forensic study of the effectiveness of selected anti-virus products against ssdt hooking rootkits;Al-Shaheri,2013
3. Mining criminal networks from unstructured text documents;Al-Zaidy;Digit. Investig.,2012
4. Privacy-preserving email forensics;Armknecht;Digit. Investig.,2015
5. Drebin: effective and explainable detection of android malware in your pocket;Arp,2014