DocumentCode
684642
Title
Table of contents
fYear
2013
fDate
21-22 Nov. 2013
Abstract
The following topics are dealt with: cybercrime; trustworthy computing; authorship analysis; locality sensitive hash; malicious spam email developments; and authorship attribution.
Keywords
authorisation; computer crime; cryptography; trusted computing; unsolicited e-mail; authorship analysis; authorship attribution; cybercrime; locality sensitive hash; malicious spam email developments; trustworthy computing;
fLanguage
English
Publisher
ieee
Conference_Titel
Cybercrime and Trustworthy Computing Workshop (CTC), 2013 Fourth
Conference_Location
Sydney NSW
Print_ISBN
978-1-4799-3075-3
Type
conf
DOI
10.1109/CTC.2013.7
Filename
6754630
Link To Document