Robert Layton

Orcid: 0000-0001-8695-7425

According to our database1, Robert Layton authored at least 21 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
A survey of similarities in banking malware behaviours.
Comput. Secur., 2018

2017
Optimization Based Clustering Algorithms for Authorship Analysis of Phishing Emails.
Neural Process. Lett., 2017

Improving Authorship Attribution in Twitter Through Topic-Based Sampling.
Proceedings of the AI 2017: Advances in Artificial Intelligence, 2017

2016
REPLOT: REtrieving Profile Links On Twitter for malicious campaign discovery.
AI Commun., 2016

Online Romance Scam: Expensive e-Living for romantic happiness.
Proceedings of the 29th Bled eConference: Digital Economy, 2016

2015
Authorship analysis of aliases: Does topic influence accuracy?
Nat. Lang. Eng., 2015

2014
A methodology for estimating the tangible cost of data breaches.
J. Inf. Secur. Appl., 2014

A Simple Local n-gram Ensemble for Authorship Verification.
Proceedings of the Working Notes for CLEF 2014 Conference, 2014

2013
Evaluating authorship distance methods using the positive Silhouette coefficient.
Nat. Lang. Eng., 2013

Automated unsupervised authorship analysis using evidence accumulation clustering.
Nat. Lang. Eng., 2013

API design for machine learning software: experiences from the scikit-learn project.
CoRR, 2013

Crime Toolkits: The Productisation of Cybercrime.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Indirect Information Linkage for OSINT through Authorship Analysis of Aliases.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2013

Local n-grams for Author Identification Notebook for PAN at CLEF 2013.
Proceedings of the Working Notes for CLEF 2013 Conference , 2013

REPLOT: REtrieving profile links on Twitter for suspicious networks detection.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Recentred local profiles for authorship attribution.
Nat. Lang. Eng., 2012

Unsupervised authorship analysis of phishing webpages.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

2011
How much material on BitTorrent is infringing content? A case study.
Inf. Secur. Tech. Rep., 2011

2010
Automatically determining phishing campaigns using the USCAP methodology.
Proceedings of the 2010 eCrime Researchers Summit, 2010

2009
Determining provenance in phishing websites using automated conceptual analysis.
Proceedings of the 2009 eCrime Researchers Summit, 2009

2008
Using Stereotypes to Improve Early-Match Poker Play.
Proceedings of the AI 2008: Advances in Artificial Intelligence, 2008


  Loading...