8976BC67-D8E5-43EB-8920-2A7FCACE1A0AIdentifying and Modelling Victim, Business, Regulatory and Malware Behaviours in a Changing Cyberthreat LandscapeResearch GrantEP/K03345X/1798CB33D-C79E-4578-83F2-72606407192CEPSRCINCOME_ACTUAL102943197064426-3761-4C10-9C30-C194FF1F3508Prediction of drive-by download attacks on TwitterInformation Processing & Management4d79e88323e5937fab8276ddcaf49becJaved A2019-01-01http://dx.doi.org/10.1016/j.ipm.2018.02.003http://dx.doi.org/10.1016/j.ipm.2018.02.0033Journal Article/Review5a995b245888e3.42077467