A Two-step Approach for Effective Detection of Misbehaving Users in Chats
暂无分享,去创建一个
Hugo Jair Escalante | Manuel Montes-y-Gómez | Luis Villaseñor Pineda | Esaú Villatoro-Tello | Antonio Juárez-González | Luis Villaseñor Pineda | H. Escalante | M. Montes-y-Gómez | Esaú Villatoro-Tello | Antonio Juárez-González | Luis Villaseñor-Pineda
[1] Rachel O’Connell Cyberspace. A TYPOLOGY OF CHILD CYBERSEXPLOITATION AND ONLINE GROOMING PRACTICES , 2003 .
[2] J. Wolak,et al. Online Victimization of Youth : Five Years Later. , 2006 .
[3] N. Pendar. Toward Spotting the Pedophile Telling victim from predator in text chats , 2007 .
[4] Berkant Barla Cambazoglu,et al. Chat mining: Predicting user and message attributes in computer-mediated communication , 2008, Inf. Process. Manag..
[5] Jeffrey Ellen,et al. Text Classification Methodologies Applied to Micro-Text in Military Chat , 2009, ICMLA.
[6] John Yearwood,et al. Detection of child exploiting chats from a mixed chat dataset as a text classification task , 2011, ALTA.
[7] Ioannis Mavridis,et al. Utilizing document classification for grooming attack recognition , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).