"Our Little Secret": pinpointing potential predators
暂无分享,去创建一个
[1] Carlo Strapparava,et al. SemEval-2007 Task 14: Affective Text , 2007, Fourth International Workshop on Semantic Evaluations (SemEval-2007).
[2] H S Pennypacker,et al. On Behavioral Analysis , 1981, The Behavior analyst.
[3] Shlomo Argamon,et al. Automatically profiling the author of an anonymous text , 2009, CACM.
[4] Anthony McEnery,et al. Rethinking language pedagogy from a corpus perspective. , 2000 .
[5] Paolo Rosso,et al. On the Impact of Sentiment and Emotion Based Features in Detecting Online Sexual Predators , 2012, WASSA@ACL.
[6] K. Lanning. Child molesters: A behavioral analysis , 2001 .
[7] John Yearwood,et al. Detection of child exploiting chats from a mixed chat dataset as a text classification task , 2011, ALTA.
[8] Fabio Crestani,et al. Overview of the International Sexual Predator Identification Competition at PAN-2012 , 2012, CLEF.
[9] R. C. Hall,et al. A profile of pedophilia: definition, characteristics of offenders, recidivism, treatment outcomes, and forensic issues. , 2007, Mayo Clinic proceedings.
[10] Rachel O’Connell Cyberspace. A TYPOLOGY OF CHILD CYBERSEXPLOITATION AND ONLINE GROOMING PRACTICES , 2003 .
[11] Nick Pendar,et al. Toward Spotting the Pedophile Telling victim from predator in text chats , 2007, International Conference on Semantic Computing (ICSC 2007).
[12] April Kontostathis,et al. Learning to Identify Internet Sexual Predation , 2011, Int. J. Electron. Commer..
[13] Bor-Luen Chiang,et al. Differential manifestations of prepubescent, pubescent and postpubescent pediatric patients with systemic lupus erythematosus: A retrospective study of 96 Chinese children and adolescents , 2012, Pediatric Rheumatology.
[14] Ioannis Mavridis,et al. Utilizing document classification for grooming attack recognition , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[15] K. Lanning,et al. Child Molesters: A Behavioral Analysis For Professionals Investigating the Sexual Exploitation of Ch , 2013 .
[16] Walter Daelemans,et al. Conversation Level Constraints on Pedophile Detection in Chat Rooms , 2012, CLEF.
[17] Craig H. Martell,et al. Topic Detection and Extraction in Chat , 2008, 2008 IEEE International Conference on Semantic Computing.
[18] Elizabeth Fast,et al. Pedophilia and sexual offending against children: Theory, assessment and intervention by Michael C. Seto, PhD, 2007, ISBN: 1-4338-0114-0 , 2010 .
[19] Lee Gillam,et al. Deception detection: dependable or defective? , 2014, Social Network Analysis and Mining.
[20] George M. Mohay,et al. Challenges of automating the detection of paedophile activity on the Internet , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).
[21] Lee Gillam,et al. Quite Simple Approaches for Authorship Attribution, Intrinsic Plagiarism Detection and Sexual Predator Identification , 2012, CLEF.
[22] N. Hoffart. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory , 2000 .
[23] H. Snyder,et al. Sexual Assault of Young Children as Reported to Law Enforcement: Victim, Incident, and Offender Characteristics. A NIBRS Statistical Report. , 2000 .
[24] Louise Ellison. Cyberstalking : Tackling harassment on the Internet , 2003 .
[25] Christopher J. Fox,et al. A stop list for general text , 1989, SIGF.
[26] Patrick Juola,et al. An Overview of the Traditional Authorship Attribution Subtask , 2012, CLEF.
[27] James W. Pennebaker,et al. Linguistic Inquiry and Word Count (LIWC2007) , 2007 .
[28] L. Olson,et al. Entrapping the Innocent: Toward a Theory of Child Sexual Predators’ Luring Communication , 2007 .
[29] David Finkelhor,et al. Explanations of pedophilia: A four factor model , 1986 .
[30] Paul Rayson,et al. Supporting Law Enforcement in Digital Communities through Natural Language Analysis , 2008, IWCF.
[31] Osma Suominen,et al. Elements of a National SemanticWeb Infrastructure--Case Study Finland on the Semantic Web , 2007 .
[32] Thorsten Joachims,et al. Text Categorization with Support Vector Machines: Learning with Many Relevant Features , 1998, ECML.
[33] Brian H. Spitzberg,et al. Obsessive relational intrusion, coping, and sexual coercion victimization , 2001 .
[34] Marshall C. Yovits,et al. Ohio State University , 1974, SGAR.
[35] Carla Van Dam,et al. The Socially Skilled Child Molester: Differentiating the Guilty from the Falsely Accused , 2006 .
[36] J. Wolak,et al. Online Victimization of Youth : Five Years Later. , 2006 .
[37] Anselm L. Strauss,et al. Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .
[38] Leslie Haddon,et al. EU kids online II: final report 2011 , 2011 .
[39] D. Segal. Diagnostic and Statistical Manual of Mental Disorders (DSM-IV-TR) , 2010 .
[40] Janis Wolak,et al. Online victimization: A report on the nation’s youth. , 2000 .
[41] K. Durkin. Misuse of the Internet by Pedophiles: Implications for Law Enforcement and Probation Practice , 2002 .
[42] Robert Dickey,et al. Pedophilia, Hebephilia, and the DSM-V , 2009, Archives of sexual behavior.