Internet Commerce Security Laboratory (ICSL)

Publications

 2013

Category

Alazab, Ammar; Abawajy, Jemal; Hobbs, Michael; Layton, Robert; Khraisat, Ansam, "Crime Toolkits: The Productisation of Cybercrime," Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on , vol., no., pp.1626,1632, 16-18 July 2013 

Threat profiling

Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul and Alazab, Moutaz 2013, Information security governance : the art of detecting hidden malware, in IT security governance innovations : theory and research, IGI Global, Hershey, Pa., pp.293-315.

Malware

Amuchi, F., Al-nemrat, A., Alazab, M., Layton, R., Identifying cyber predators through forensic authorship analysis of chat logs, Proceedings – 2012 3rd Cybercrime and trustworthy Computing Workshop, CTC 2012, IEEE, pp 28-37, 2013.

Threat profiling

Azab, A., Watters, P.A., Layton, R., Characterising network traffic for skype forensics, Proceedings – 2012 3rd Cybercrime and trustworthy Computing Workshop, CTC 2012, IEEE, pp 19-27, 2013

Forensics

Buitinck, L., Louppe, G., Blondel, M., Pedregosa, F., Mueller, A., Grisel, O., & Varoquaux, G. (2013). API design for machine learning software: experiences from the scikit-learn project. arXiv preprint arXiv:1309.0238

Security

Layton, R., Mccombie, S., Watters, P. A., Authorship attribution of IRC messages using inverse author frequency, , Proceedings – 2012 3rd Cybercrime and trustworthy Computing Workshop, CTC 2012, IEEE, pp 7-13, 2013

Threat profiling

Layton, R., Watters, P. A., Dazeley, R.,  Unsupervised authorship analysis of phishing webpages,  2012 International Symposium on Communications and Information Technologies, ISCIT 2012, pp 1104 - 1109

Threat profiling

Layton, R., Perez, C., Birregah, B., Watters, P., & Lemercier, M. (2013). Indirect Information Linkage for OSINT through Authorship Analysis of Aliases. In Trends and Applications in Knowledge Discovery and Data Mining (pp. 36-46). Springer Berlin Heidelberg

Threat profiling

Layton, R., Watters, P. A., Dazeley, R. (2013) Automated unsupervised authorship analysis using evidence accumulation clustering, Natural Language Engineering, Cambridge University Press, pp 95-120

Threat profiling

Layton, R., Watters, P. A., Dazeley, R., (2013)  Evaluating authorship distance methods using the positive Silhouette coefficient, Natural Language Engineering,  Cambridge University Press, pp 517-535.

Threat profiling

Layton, R., Perez, C.,  Birregah, B., Watters, P.,  Lemercier, M., Indirect information linkage for OSINT through authorship analysis of aliases.The International Workshop on Data Mining Applications in Industry & Government (DMApps 2013), 1–12. 2013.

Threat profiling

Layton, R., Perez, C., Birregah, B., Watters, P.,  Lemercier, M., Indirect Information Linkage for OSINT through Authorship Analysis of Aliases, Trends and Applications in Knowledge Discovery and Data Mining, Lecture Notes in Computer Science Volume 7867, 2013, pp 36-46

Threat profiling

Layton, R., Watters, P.A., Dazeley, R., Recentred local profiles for authorship attribution, Natural Language Engineering, Cambridge University Press, pp 293- 312, 2013

Threat profiling

Perez, C., Birregah, B., Layton, R., Lemercier, M., & Watters, P. (2013). REPLOT: REtrieving Profile Links On Twitter for suspicious networks detection. In 2013 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013) (pp. 1-8). IEEE.

Threat profiling

Prichard, J., Spiranovic, C., Watters, P. and Lueg, C. (2013), Young people, child pornography, and subcultural norms on the Internet. J. Am. Soc. Inf. Sci., 64: 992–1000. doi: 10.1002/asi.22816

Threat profiling

Ureche, O.E., Layton, R., Watters, P.A., Towards an implementation of information flow security using semantic web technologies, Proceedings – 2012 3rd Cybercrime and Trustworthy Computing Workshop, CTC 2012, IEEE, pp75-80, 2013

Malware

Watters, P.,  (2013) "Modelling the effect of deception on investigations using open source intelligence (OSINT)", Journal of Money Laundering Control, Vol. 16 Iss: 3, pp.238 – 248

Threat profiling

Watters, P.A. et al. Patterns of ownership of child model sites: Profiling the profiteers and consumers of child exploitation material. First Monday, [S.l.], Jan. 2013. ISSN 13960466. Available at: <http://www.firstmonday.dk/ojs/index.php/fm/article/view/4300>. Date accessed: 03 Jan. 2014. doi:10.5210/fm.v18i2.4300.

Threat profiling/Forensics

Zhou J, Maruatona O, Wang W, 'Parameter optimization for support vector machine classifiers with IO-GA' in unknown (ed(s)), Proceedings of 2011 First International Workshop on Complexity of Data Mining (unknown, IEEE, 2011), pp. 117-120.

Threat profiling

 2012

 

Abawajy, J. & Kelarev, A. V. (2012). A multi-tier ensemble construction of classifiers for phishing email detection and filtering. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7672 LNCS pp.48-56. (Berlin, Germany) Springer Verlag Melbourne, Australia, 12/12/2012 CIAO Xiang, Yang, Lopez, Javier, Kuo, C.C. Jay, Zhou, Wanlei

Threat profiling

Alazab, M., Watters, P.A., Venkatraman, S., Alazab, M. and Alazab, A. (2012). Malware Forensics: The Art of Detecting Hidden Maliciousness in  Mellado, D., S??nche, L.E.,  ), Fern??ndez-Medina, E., and Piattini, M. G., IT Security Governance Innovations: Theory and Research,. IGI Global. 11, 293-315.

Malware

Alazab, M., Watters, P.A., Venkatraman, S., Alazab, M. and Alazab, A. (2012). Malware Forensics: The Art of Detecting Hidden Maliciousness Book in IT Security Governance. IGI Global.

Malware

Azab, A., Watters, P.A. and Layton, R. (2012). Characterising network traffic for Skype forensics. Proceedings of the 3rd Workshop on Cybercrime and Trustworthy Computing

Forensics

Dekker, A., Perez-roses, H., Pineda-Villavicencio, G. & Watters, P. A. (2012). The Maximum Degree & Diameter-Bounded Subgraph and its Applications. Journal of Mathematical Modelling and Algorithms, 11 (3), pp.249-268.

Security

Goyal, R., Sharma, S., Bevinakoppa, S. & Watters, P.A. (2012). Obfuscation of Stuxnet and Flame malware. Proceedings of the AICT Conference, Barcelona.

Malware

Kelarev, A.V., Yearwood, J. L., Watters, P.A., Wu, X., Ma, L., Abawajy, J. & Pan, L. (2011). A Groebner-Shirshov algorithm for applications in internet security.  Southeast Asian Bulletin of Mathematics, 36(1), 87-100.

Threat profiling

Layton, R., McCombie, S. & Watters, P.A. (20120). Authorship attribution of IRC messages using inverse author frequency.  Proceedings of the 3rd Workshop on Cybercrime and Trustworthy Computing

Threat profiling

Layton, R., Watters, P. A. & Dazeley, R. (2012). Recentred local profiles for authorship attribution. Natural Language Engineering, 18 (3), pp.293-312.

Threat profiling

Layton, R., Watters P.A. & Dazeley, R. (2012). Evaluation Authorship Distance Metrics using the Positive Silhouette Coefficient. Journal of Natural Language Engineering.

Threat profiling

Layton, R., Watters, P. A. & Dazeley, R. (2012). Unsupervised authorship analysis of phishing webpages. 2012 International Symposium on Communications and Information Technologies, ISCIT 2012, pp.1104-1109. (Queensland) IEEE Gold-Coast, Australia 2/10/2012 CIAO Communications and Information Technologies (ISCIT),

Threat profiling

Maruatona, O. O., Vamplew, P. & Dazeley, R. (2012). RM and RDM, a Preliminary Evaluation of Two Prudent RDR Techniques. Knowledge Management and Acquisition for Intelligent Systems: 12th Pacific Rim Knowledge Acquisition workshop, LNCS7457 pp.188-194. (Berlin) Springer Malaysia 5/09/2012 CIAO BH Kang and D Richards

Fraud

McCombie, S., Pieprzyk, J., Watters, P.A. & Layton, R. (2012). Russia, Ukraine and Global Cybercrime: The Australian Perspective. Proceedings of the 2nd International Conference on Cybercrime, Security & Digital Forensics

Threat profiling

Ng, A., Watters, P.A., & Chen, S. (2012). A consolidated process and technology model for identity management. Information Resources Management Journal.

Security

Pineda-Villavicencio, G., Perez, H., Dekker, T., & Watters, P.A. (2012). The maximum degree & diameter-bounded subgraph and its applications. Journal of Mathematical Modelling and Algorithms (DOI: 10.1007/s10852-012-9182-8)

Security

Prichard, J., Spiranovic, C., Watters, P.A., & Lueg, C. (2012). Young people, child pornography and subcultural norms on the Internet. Journal of the American Society for Information Science and Technology.

Threat profiling

Ureche, O., Layton, R., & Watters, P.A. (2012). Towards an implementation of information flow security using semantic web technologies. Proceedings of the 3rd Workshop on Cybercrime and Trustworthy Computing

Malware

Watters, P. A. & Phair, N. (2012). Detecting illicit drugs on social media using Automated Social Media Intelligence Analysis (ASMIA). Cyberspace Safety and Security, 7672 pp.66-76. (ONLINE) Springer Verlag MELBOURNE, AUSTRALIA 12/12/2012 CIAO Yang Xiang, Javier Lopez, C.-C. Jay Kuo, Wanlei Zhou

Threat profiling

Watters, P.A., McCombie, S., Layton, R. & Pieprzyk, J. (2012). Characterising and Predicting Cyber Attacks Using the Cyber Attacker Model Profile (CAMP). Journal of Money Laundering Control, 15(4).

Threat profiling

Watters, P.A. (2012). Challenges to Automated Allegory Resolution in Open Source Intelligence. Proceedings of the 3rd Workshop on Cybercrime and Trustworthy Computing.

Forensics

 2011

 

Alazab, M., Venkatraman, S., Watters, P.A. & Alazab, M. (2011). Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures. Proceedings of the 9th Australian Data Mining Conference. 

Malware

Alazab, M., Venkatraman, S., Watters, P.A., Alazab, M & Alazab, A. (2011). Cybercrime: The case of obfuscated malware. Proceedings of the 7th International Conference on Global Security, Safety and Sustainability (ICGS3); Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 9 (Springer).

Malware

Bruck, S. & Watters, P.A. (2011) The Factor Structure of Cybersickness. Displays, 32(4), 153-158. 

Security

Islam, M., Watters, P.A. & Yearwood, J. (2011). Child face detection using age specific luminance invariant geometric descriptors. Proceedings of the IEEE International Conference on Signal and Image Processing Applications (ICSIPA 2011)

Forensics

Islam, M., Watters, P.A. & Yearwood, J. (2011). Real-time detection of children's skin on social networking sites using Markov Random Field Modelling. Information Security Technical Report, 16(2), 51-58.

Forensics

Kelarev, A.V., Yearwood, J.L., & Watters, P.A. (2011). A data mining application of the incidence semirings. Houston Journal of Mathematics.

Security

Kelarev, A.V., Yearwood, J. L., Watters, P.A. (2011). Optimization of classifiers for data mining based on combinatorial semigroups. Semigroup Forum, 82, 242–251.

Security

Kelarev, A., Brown, S., Watters, P.A., Wu, X. & Dazeley, R. (2011). Establishing Reasoning Communities of Security Experts for Internet Commerce Security. In J. Yearwood and A. Stranieri (Eds) Technologies for Supporting Reasoning Communities and Collaborative Decision Making: Cooperative Approaches IGI Global. ISBN 1-60960-091-6

Security

Layton, R., Watters, P.A., & Dazeley, R. (2011). Recentred local profiles for authorship attribution. Natural Language Engineering, DOI: 10.1017/S1351324911000180.

Threat profiling

Layton, R., Watters, P.A., & Dazeley, R. (2011).  Automated Unsupervised Authorship Analysis Using Evidence Accumulation Clustering. Natural Language Engineering, DOI: 10.1017/S1351324911000313

Threat profiling

Prichard, J., Watters, P.A. & Spiranovic, C. (2011). Internet subcultures and pathways to the use of child pornography. Computer Law & Security Review, 27, 585-600.

Threat profiling/Forensics

Watters, P.A. & Layton, R. (2011). Fake file detection in P2P networks by consensus and reputation. Proceedings of the 1st International Workshop on Complexity and Data Mining, 80-83.

Threat profiling

Watters, P.A., Layton, R., & Dazeley, R. (2011). How much material on BitTorrent networks is infringing content?  Information Security Technical Report, 16(2), 79-87.

Threat profiling

Watters, P.A. & McCombie, S. (2011). A methodology for analysing the credential marketplace. Journal of Money Laundering Control, 14(1), 32-43.

Threat profiling

Yan, F., Wang, W. & Watters, P.A. (2011). Determining the Influence of Visual Training on EEG Activity Patterns Using Association Rule Mining. Proceedings of the 1st International Workshop on Complexity and Data Mining, 64-67.

Threat profiling

Zhang, L., Yu, S., Wu, D. & Watters, P.A. (2011). A Survey on Latest Botnet Attacks and Defenses. Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 53-60.

Malware

 2010

 

Lobo, D., Watters, P.A., & Wu, X. (2010). RBACS: Rootkit Behavioral Analysis and Classification System. Proceedings of the International Conference on Knowledge Discovery and Data Mining (WKDD 2010). 

Malware

 

Lobo, D., Watters, P.A. & Wu, X. (2010). A New Procedure to Help System/Network Administrators Identify Multiple Rootkit Infections. Proceedings of the International Conference on Communication Software and Networks (ICCSN 2010).

Malware

 2009

 

Alazab, M., Venkatraman, S., & Watters, P.A. (2009). Digital forensic techniques for static analysis of NTFS Proceedings of the International Conference on Information Technology, ICIT 2009.

Forensics

Islam, M. & Watters, P.A. (2009). A New Stochastic Model Based Approach for Object Identification and Segmentation in Textured Color Images. Proceedings of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 09).

Forensics

Islam, M. & Watters, P.A. (2009). An Unsupervised Stochastic Model for Detection and Identification of Objects in Textured Color Images Using A Segmentation Technique. Proceedings of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 09).

Forensics

Stabek, A., Brown, S., & Watters, P.A. (2009). The Case for a Consistent Cyberscam Classification Framework (CCCF). Proceedings of the Cybercrime and Trustworthy Computing Workshop (CTC-2009).

Identity Theft & Scams

Kelarev, A., Watters, P. & Yearwood, J. (2009). Rees matrix constructions for clustering of data. Journal of the Australian Mathematical Society, 87, 377-393.

Threat profiling

Ma, L., Yearwood, J., & Watters, P.A. (2009). Establishing Phishing Provenance Using Orthographic nu Features. Proceedings of the APWG E-crime Research Summit.

Threat profiling

Layton, R., Brown, S. & Watters, P.A. (2009). Using differencing to increase distinctiveness for phishing website clustering. Proceedings of the Cybercrime and Trustworthy Computing Workshop (CTC-2009)

Threat profiling

Aston, M., McCombie, S., Reardon, B. & Watters, P.A. (2009). A Preliminary profiling of internet money mules: An Australian perspective. Proceedings of the Cybercrime and Trustworthy Computing Workshop (CTC-2009).

Threat profiling

Ma., L., Ofoghi, B., Watters, P.A. & Brown, S. (2009). Detecting Phishing Emails Using Hybrid Features. Proceedings of the Cybercrime and Trustworthy Computing Workshop (CTC-2009)

Threat profiling

Watters, P.A. (2009). Why Do Users Trust The Wrong Messages? A Behavioural Model of Phishing. Proceedings of the APWG E-crime Research Summit.

Threat profiling

Layton, R., & Watters, P.A. (2009). Determining provenance of phishing websites using automated conceptual analysis. Proceedings of the APWG E-crime Research Summit.

Threat profiling 

Ma, L. Torney, R., Watters, P.A. & Brown, S. (2009). Automatically Generating Classifier for Phishing Email Prediction. International Workshop on Information Assurance and Security Management (IASM 2009). 

Threat profiling

 

Watters, P.A. (2009). Data loss in the British Government: A bounty of credentials for organised Proceedings of the Cybercrime and Trustworthy Computing Workshop (CTC-2009). 

Security

Watters, P.A. (2009). University Incorporated: Implications for Professional Information Security Education. Corporate Governance.  

Security

Watters, P.A., Kuh, D., Latham, S., Shah, I., & Garwood, K. (2009). Enabling Access to British Birth Cohort Studies: A Secure Web Interface for the NSHD (SWIFT). IEEE International Conference on e-Health Networking, Application and Services (IEEE Healthcom 2009).  

Security

 

 2008

 

McCombie, S., Watters, P.A., Ng, A. & Watson, B. (2008). Forensic Characteristics Of Phishing - Petty Theft or Organized Crime? Proceedings of the 4th International Conference on Web Information Systems and Technologies (WEBIST), Madeira, Portugal

Threat profiling

Watters, P.A., Martin, F. & Stripf, S. (2008). Visual detection of LSB-encoded natural image steganography. ACM Transactions on Applied Perception 

Security 

Wu, X.W., Watters, P. & Yearwood, J. (2008). New Traceability Codes and Identification Algorithm for Tracing Pirates. Proceedings of the IEEE Cybercrime Workshop, ISPA 2008, 719-724.

Forensics