-
1
-
-
0003968659
-
-
(Eds) ( ), RAND, Santa Monica, CA
-
Arquilla, J. and Ronfeldt, D. (Eds) (2001), Networks and Netwars: The Future of Terror, Crime, and Militancy, RAND, Santa Monica, CA.
-
(2001)
Networks and Netwars: The Future of Terror, Crime, and Militancy
-
-
Arquilla, J.1
Ronfeldt, D.2
-
2
-
-
72849132152
-
A preliminary profiling of internet money mules: an Australian perspective. uic‐atc
-
( ), “”, &hyphen
-
Aston, M., McCombie, S., Reardon, B. and Watters, P.A. (2009), “A preliminary profiling of internet money mules: an Australian perspective. uic‐atc”, Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, Brisbane, Australia, pp. 482‐7.
-
(2009)
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, Brisbane, Australia
, pp. 482-487
-
-
Aston, M.1
McCombie, S.2
Reardon, B.3
Watters, P.A.4
-
3
-
-
85064429939
-
From < Bonehead> to < cLoNehEAd>: nicknames, play and identity on internet relay chat
-
( ), “”, &colon
-
Bechar‐Israeli, H. (1995), “From < Bonehead> to < cLoNehEAd>: nicknames, play and identity on internet relay chat”, Journal of Computer‐Mediated Communication, Vol. 1 No. 2, available at: www.usc.edu/dept/annenberg/vol1/issue2/bechar.html.
-
(1995)
Journal of Computer‐Mediated Communication
, vol.1
, Issue.2
-
-
Bechar&hyphen1
Israeli, H.2
-
4
-
-
43249150599
-
Fractal geometry of texts
-
( ), “”, &hyphen
-
Eftekhari, A. (2006), “Fractal geometry of texts”, Journal of Quantitative Linguistics, Vol. 13 Nos 2/3, pp. 177‐93.
-
(2006)
Journal of Quantitative Linguistics
, vol.13
, Issue.2
, pp. 177-193
-
-
Eftekhari, A.1
-
5
-
-
15744362036
-
Statistical and structural approaches to filtering internet pornography
-
( ), “”, &hyphen
-
Ho, W.H. and Watters, P.A. (2004), “Statistical and structural approaches to filtering internet pornography”, Proceedings of the IEEE Conference on SMC, Hague, pp. 4792‐8.
-
(2004)
Proceedings of the IEEE Conference on SMC, Hague
, pp. 4792-4798
-
-
Ho, W.H.1
Watters, P.A.2
-
6
-
-
78649832038
-
Authorship attribution for Twitter in 140 characters or less
-
( ), “”, &hyphen
-
Layton, R., Watters, P. and Dazeley, R. (2010), “Authorship attribution for Twitter in 140 characters or less”, Proceedings of the 2nd Cybercrime and Trustworthy Computing Workshop, pp. 1‐8.
-
(2010)
Proceedings of the 2nd Cybercrime and Trustworthy Computing Workshop
, pp. 1-8
-
-
Layton, R.1
Watters, P.2
Dazeley, R.3
-
7
-
-
78649836899
-
Winning the phishing war: a strategy for Australia
-
( ), “”, &hyphen
-
McCombie, S. and Pieprzyk, J. (2010), “Winning the phishing war: a strategy for Australia”, Proceedings of the 2nd Cybercrime and Trustworthy Computing Workshop, pp. 76‐86.
-
(2010)
Proceedings of the 2nd Cybercrime and Trustworthy Computing Workshop
, pp. 76-86
-
-
McCombie, S.1
Pieprzyk, J.2
-
8
-
-
78649883253
-
Cybercrime attribution: an eastern European case study
-
( ), “&rdquo
-
McCombie, S., Pieprzyk, J. and Watters, P.A. (2009), “Cybercrime attribution: an eastern European case study”, Proceedings of the 7th Australian Digital Forensics Conference, WA.
-
(2009)
Proceedings of the 7th Australian Digital Forensics Conference, WA
-
-
McCombie, S.1
Pieprzyk, J.2
Watters, P.A.3
-
9
-
-
58049158943
-
Forensic characteristics of phishing – petty theft or organized crime?
-
( ), “”, &hyphen
-
McCombie, S., Watters, P.A., Ng, A. and Watson, B. (2008), “Forensic characteristics of phishing – petty theft or organized crime?”, Proceedings of WEBIST, pp. 149‐57.
-
(2008)
Proceedings of WEBIST
, pp. 149-157
-
-
McCombie, S.1
Watters, P.A.2
Ng, A.3
Watson, B.4
-
10
-
-
84953744816
-
A statistical interpretation of term specificity and its application in retrieval
-
( ), “”, &hyphen
-
Spärck Jones, K. (1972), “A statistical interpretation of term specificity and its application in retrieval”, Journal of Documentation, Vol. 28 No. 1, pp. 11‐21.
-
(1972)
Journal of Documentation
, vol.28
, Issue.1
, pp. 11-21
-
-
Spä1
rck Jones, K.2
-
11
-
-
85064432242
-
The case for a consistent cybercrime classification framework
-
( ), “”, &hyphen
-
Stabek, A., Brown, S. and Watters, P.A. (2009), “The case for a consistent cybercrime classification framework”, Proceedings of the 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, Brisbane, pp. 523‐30.
-
(2009)
Proceedings of the 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, Brisbane
, pp. 523-530
-
-
Stabek, A.1
Brown, S.2
Watters, P.A.3
-
12
-
-
85064793798
-
Drug cartels, street gangs and warlords
-
( ), “”, &hyphen
-
Sullivan, J. and Bunker, R. (2002), “Drug cartels, street gangs and warlords”, Small Wars & Insurgencies, Vol. 13 No. 2, pp. 40‐53.
-
(2002)
Small Wars & Insurgencies
, vol.13
, Issue.2
, pp. 40-53
-
-
Sullivan, J.1
Bunker, R.2
|