Calculated based on number of publications stored in Pure and citations from Scopus
20062024

Research activity per year

Filter
Chapter

Search results

  • 2009

    Email worm detection using data mining

    Masud, M. M., Khan, L. & Thuraisingham, B., 2009, Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues. IGI Global, p. 20-34 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • 2008

    Detecting remote exploits ising data mining

    Masud, M., Khan, L., Thuraisingham, B., Wang, X., Liu, P. & Zhu, S., 2008, Advances in Digital Forensics IV. Cuenca, P., Guerrero, C., Puigjaner, R. & Serra, B. (eds.). p. 177-189 13 p. (IFIP International Federation for Information Processing; vol. 285).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    7 Citations (Scopus)