Author of the publication

Mining writeprints from anonymous e-mails for forensic investigation.

, , , and . Digital Investigation, 7 (1-2): 56-64 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network anomaly detection using a cross-correlation-based long-range dependence analysis., , , , and . Int. J. Netw. Manag., (2020)A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection., , , , , and . IEEE Access, (2018)A unified data mining solution for authorship analysis in anonymous textual communications., , , and . Inf. Sci., (2013)Multidimensional investigation of source port 0 probing., , , and . Digit. Investig., 11 (Supplement 2): S114-S123 (2014)Characterization of Covert Channels in DNS., , , and . NTMS, page 1-5. IEEE, (2014)On the analysis of the Zeus botnet crimeware toolkit., , , , , , and . PST, page 31-38. IEEE, (2010)Denial of service detection using dynamic time warping., , , , , and . Int. J. Netw. Manag., (2021)Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats., , , , , , and . IEEE Access, (2019)Mining writeprints from anonymous e-mails for forensic investigation., , , and . Digital Investigation, 7 (1-2): 56-64 (2010)Anomaly Detection Using Dynamic Time Warping., , , , , and . CSE/EUC, page 193-198. IEEE, (2019)