Æȷοì
Robert Layton
Robert Layton
Federation University Australia
datapipeline.com.auÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
API design for machine learning software: experiences from the scikit-learn project
L Buitinck, G Louppe, M Blondel, F Pedregosa, A Mueller, O Grisel, ...
arXiv preprint arXiv:1309.0238, 2013
32832013
Authorship attribution for twitter in 140 characters or less
R Layton, P Watters, R Dazeley
Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second, 1-8, 2010
2032010
Malware Detection Based on Structural and Behavioural Features of API Calls
M Alazab, R Layton, S Venkataraman, P Watters
School of Computer and Information Science, Security Research Centre, Edith ¡¦, 2010
972010
A methodology for estimating the tangible cost of data breaches
R Layton, PA Watters
Journal of information security and applications 19 (6), 321-330, 2014
942014
Malicious spam emails developments and authorship attribution
M Alazab, R Layton, R Broadhurst, B Bouhours
2013 fourth cybercrime and trustworthy computing workshop, 58-68, 2013
692013
Automated unsupervised authorship analysis using evidence accumulation clustering
R Layton, P Watters, R Dazeley
Natural Language Engineering 19 (1), 95-120, 2013
682013
Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP)
PA Watters, S McCombie, R Layton, J Pieprzyk
Journal of Money Laundering Control 15 (4), 430-441, 2012
602012
The Seven Scam Types: Mapping the Terrain of Cybercrime
A Stabek, P Watters, R Layton
Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second, 41-51, 2010
562010
Automatically determining phishing campaigns using the USCAP methodology
R Layton, P Watters, R Dazeley
eCrime Researchers Summit (eCrime), 2010, 1-8, 2011
492011
Recentred local profiles for authorship attribution
R Layton, P Watters, R Dazeley
Natural Language Engineering 18 (3), 293-312, 2012
472012
Scikit-learn: Machine learning in Python
L Buitinck, G Louppe, M Blondel, F Pedregosa, A Mueller, O Grisel, ...
Journal of machine learning research 12 (85), 2825-2830, 2011
452011
ECML PKDD Workshop: Languages for Data Mining and Machine Learning
L Buitinck, G Louppe, M Blondel, F Pedregosa, A Mueller, O Grisel, ...
API Design for Machine Learning Software: Experiences from the Scikit-Learn ¡¦, 2013
352013
Learning data mining with python
R Layton
Packt Publishing Ltd, 2015
342015
Evaluating authorship distance methods using the positive Silhouette coefficient
R Layton, P Watters, R Dazeley
Natural Language Engineering 19 (4), 517-535, 2013
322013
Authorship attribution of irc messages using inverse author frequency
R Layton, S McCombie, P Watters
2012 Third Cybercrime and Trustworthy Computing Workshop, 7-13, 2012
312012
Determining provenance in phishing websites using automated conceptual analysis
R Layton, P Watters
eCrime Researchers Summit, 2009. eCRIME'09., 1-7, 2009
272009
Characterising network traffic for skype forensics
A Azab, P Watters, R Layton
2012 Third cybercrime and trustworthy computing workshop, 19-27, 2012
262012
Identifying cyber predators through forensic authorship analysis of chat logs
F Amuchi, A Al-Nemrat, M Alazab, R Layton
2012 Third Cybercrime and Trustworthy Computing Workshop, 28-37, 2012
262012
Unsupervised authorship analysis of phishing webpages
R Layton, P Watters, R Dazeley
2012 International Symposium on Communications and Information Technologies ¡¦, 2012
242012
Investigation into the extent of infringing content on BitTorrent networks
R Layton, P Watters
Internet Commerce Security Laboratory, 8-10, 2010
242010
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20