Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automating phishing website identification through deep MD5 matching., and . eCrime, page 1-7. IEEE, (2008)Phish-Net: Investigating phish clusters using drop email addresses., , , , , and . eCrime, page 1-13. IEEE, (2013)UDaaS: A Cloud-Based URL-Deduplication-as-a-Service for Big Datasets., , , and . BDCloud, page 271-272. IEEE Computer Society, (2014)Clustering Potential Phishing Websites Using DeepMD5., , , and . LEET, USENIX Association, (2012)Mining spam email to identify common origins for forensic application., , , and . SAC, page 1433-1437. ACM, (2008)Clustering malware-generated spam emails with a novel fuzzy string matching algorithm., , and . SAC, page 889-890. ACM, (2009)Revealing common sources of image spam by unsupervised clustering with visual features., , , and . SAC, page 891-892. ACM, (2009)High-performance content-based phishing attack detection., , , and . eCrime Researchers Summit, page 1-9. IEEE, (2011)Explaining Cybercrime through the Lens of Differential Association Theory, Hadidi44-2.php PayPal Case Study., , , and . eCrime Researchers Summit, page 1-7. IEEE, (2012)Exploitation of ICMP time exceeded packets for a large-scale router delay analysis., and . Int. Arab J. Inf. Technol., 16 (6): 1090-1097 (2019)