Artemis: Protection from Sexual Exploitation Attacks via SMS
暂无分享,去创建一个
Ioannis Mavridis | Dimitrios Michalopoulos | Eustathios Papadopoulos | Dimitri A. Michalopoulos | I. Mavridis | Eustathios Papadopoulos
[1] Flavio Muratore. UMTS: Mobile Communications for the Future , 2000 .
[2] F. Muratore,et al. Study on the application of turbo codes in a satellite system , 1996, Proceedings of the Second European Workshop on Mobile/Personal Satcoms (EMPS 96) Mobile and Personal Satellite Communications.
[3] April Kontostathis,et al. Text Mining and Cybercrime , 2010 .
[4] Osma Suominen,et al. Elements of a National SemanticWeb Infrastructure--Case Study Finland on the Semantic Web , 2007 .
[5] Michele L. Ybarra,et al. Online "predators" and their victims: myths, realities, and implications for prevention and treatment. , 2008, The American psychologist.
[6] Ioannis Mavridis,et al. Utilizing document classification for grooming attack recognition , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[7] Rachel O’Connell Cyberspace. A TYPOLOGY OF CHILD CYBERSEXPLOITATION AND ONLINE GROOMING PRACTICES , 2003 .
[8] Nick Pendar,et al. Toward Spotting the Pedophile Telling victim from predator in text chats , 2007, International Conference on Semantic Computing (ICSC 2007).
[9] L. Olson,et al. Entrapping the Innocent: Toward a Theory of Child Sexual Predators’ Luring Communication , 2007 .
[10] R. C. Hall,et al. A profile of pedophilia: definition, characteristics of offenders, recidivism, treatment outcomes, and forensic issues. , 2007, Mayo Clinic proceedings.