GARS: Real-time system for identification, assessment and control of cyber grooming attacks
暂无分享,去创建一个
Marija Jankovic | Ioannis Mavridis | Dimitrios Michalopoulos | Dimitri A. Michalopoulos | I. Mavridis | M. Jankovic
[1] Yuichi Kitamura,et al. Empirical Likelihood Methods in Econometrics: Theory and Practice , 2006 .
[2] Lilian Mitrou,et al. Smartphone sensor data as digital evidence , 2013, Comput. Secur..
[3] Lilian Mitrou,et al. Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition , 2012, SEC.
[4] Kam-Fai Wong,et al. Interpreting TF-IDF term weights as making relevance decisions , 2008, TOIS.
[5] Ioannis Mavridis,et al. A method to calculate social networking hazard probability in definite time , 2013, Inf. Manag. Comput. Secur..
[6] R. O'Connell,et al. A typology of cybersexploitation and online grooming practices , 2003 .
[7] Ophir Frieder,et al. Repeatable evaluation of search services in dynamic environments , 2007, TOIS.
[8] Frank Schmalleger,et al. Crimes of the Internet , 2008 .
[9] Irina Rish,et al. An empirical study of the naive Bayes classifier , 2001 .
[10] Dimitris Gritzalis,et al. An Insider Threat Prediction Model , 2010, TrustBus.
[11] R. Wells. Applied Coding and Information Theory for Engineers , 1998 .
[12] Ioannis Mavridis,et al. Utilizing document classification for grooming attack recognition , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[13] Marilyn A. Walker,et al. Using Linguistic Cues for the Automatic Recognition of Personality in Conversation and Text , 2007, J. Artif. Intell. Res..
[14] Wei Wu,et al. Evaluation of normalization methods for cDNA microarray data by k-NN classification , 2005, BMC Bioinformatics.
[15] L. Olson,et al. Entrapping the Innocent: Toward a Theory of Child Sexual Predators’ Luring Communication , 2007 .
[16] B. Schneider,et al. Bullying and the Big Five , 2003 .
[17] I. I. Hirschman,et al. Extreme Eigen Values of Toeplitz Operators , 1977 .
[18] Michio Sugeno,et al. Fuzzy identification of systems and its applications to modeling and control , 1985, IEEE Transactions on Systems, Man, and Cybernetics.
[19] Meng Joo Er,et al. Automatic Generation of Fuzzy Inference Systems Using Unsupervised Learning , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..
[20] Chuen-Chien Lee,et al. Fuzzy logic in control systems: fuzzy logic controller. II , 1990, IEEE Trans. Syst. Man Cybern..
[21] April Kontostathis,et al. Text Mining and Cybercrime , 2010 .
[22] Christos Douligeris,et al. S-Port: Collaborative security management of Port Information systems , 2013, IISA 2013.
[23] G. Bonanno,et al. Revictimization and Self-Harm in Females Who Experienced Childhood Sexual Abuse , 2003, Journal of interpersonal violence.
[24] New York Dover,et al. ON THE CONVERGENCE PROPERTIES OF THE EM ALGORITHM , 1983 .
[25] Ioannis Mavridis,et al. Artemis: Protection from Sexual Exploitation Attacks via SMS , 2012, 2012 16th Panhellenic Conference on Informatics.
[26] Con Stough,et al. The big 5 dimensional personality approach to understanding sex offenders , 2001 .
[27] Athanasios Papoulis,et al. Probability, Random Variables and Stochastic Processes , 1965 .
[28] Lilian Mitrou,et al. Which side are you on? A new Panopticon vs. privacy , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[29] Ronald E. Riggio,et al. Personality and deception ability , 1988 .