ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2014 Fifth Cybercrime and Trustworthy Computing Conference
Latest Publications
TOTAL DOCUMENTS
17
(FIVE YEARS 0)
H-INDEX
3
(FIVE YEARS 0)
Published By IEEE
9781479988259
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Analysis of Malware Behaviour: Using Data Mining Clustering Techniques to Support Forensics Investigation
2014 Fifth Cybercrime and Trustworthy Computing Conference
◽
10.1109/ctc.2014.10
◽
2014
◽
Cited By ~ 5
Author(s):
Edem Inang Edem
◽
Chafika Benzaid
◽
Ameer Al-Nemrat
◽
Paul Watters
Keyword(s):
Data Mining
◽
Clustering Techniques
◽
Using Data
Download Full-text
Mining Malware to Detect Variants
2014 Fifth Cybercrime and Trustworthy Computing Conference
◽
10.1109/ctc.2014.11
◽
2014
◽
Cited By ~ 15
Author(s):
Ahmad Azab
◽
Robert Layton
◽
Mamoun Alazab
◽
Jonathan Oliver
Download Full-text
A Comparative Study of Likelihood Ratio Based Forensic Text Comparison Procedures: Multivariate Kernel Density with Lexical Features vs. Word N-grams vs. Character N-grams
2014 Fifth Cybercrime and Trustworthy Computing Conference
◽
10.1109/ctc.2014.9
◽
2014
◽
Author(s):
Shunichi Ishihara
Keyword(s):
Comparative Study
◽
Likelihood Ratio
◽
Kernel Density
Download Full-text
[Front cover]
2014 Fifth Cybercrime and Trustworthy Computing Conference
◽
10.1109/ctc.2014.17
◽
2014
◽
Keyword(s):
Front Cover
Download Full-text
Reviewers
2014 Fifth Cybercrime and Trustworthy Computing Conference
◽
10.1109/ctc.2014.6
◽
2014
◽
Download Full-text
Program Committee
2014 Fifth Cybercrime and Trustworthy Computing Conference
◽
10.1109/ctc.2014.5
◽
2014
◽
Keyword(s):
Program Committee
Download Full-text
Table of Contents
2014 Fifth Cybercrime and Trustworthy Computing Conference
◽
10.1109/ctc.2014.7
◽
2014
◽
Download Full-text
Be Careful Who You Trust: Issues with the Public Key Infrastructure
2014 Fifth Cybercrime and Trustworthy Computing Conference
◽
10.1109/ctc.2014.8
◽
2014
◽
Cited By ~ 1
Author(s):
Paul Black
◽
Robert Layton
Keyword(s):
Public Key Infrastructure
◽
Public Key
◽
The Public
Download Full-text
[Copyright notice]
2014 Fifth Cybercrime and Trustworthy Computing Conference
◽
10.1109/ctc.2014.3
◽
2014
◽
Keyword(s):
Copyright Notice
Download Full-text
[Publisher's information]
2014 Fifth Cybercrime and Trustworthy Computing Conference
◽
10.1109/ctc.2014.16
◽
2014
◽
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close