Detecting child sexual abuse material: A comprehensive survey
HE Lee, T Ermakova, V Ververis, B Fabian - Forensic Science International …, 2020 - Elsevier
Victims of child sexual abuse suffer from physical, psychological, and emotional trauma. The
detection and deletion of illicit online child sexual abuse material (CSAM) helps in reducing …
detection and deletion of illicit online child sexual abuse material (CSAM) helps in reducing …
Even “lurkers” download: the behavior and illegal activities of members on a child sexual exploitation TOR hidden service
M van der Bruggen, I van Balen… - Aggression and violent …, 2022 - Elsevier
Abstract Knowledge about online child sexual exploitation (CSE) offenders mostly remains
limited to offender populations known by the criminal justice system. Because of its hidden …
limited to offender populations known by the criminal justice system. Because of its hidden …
Harvesting and analysis of weak signals for detecting lone wolf terrorists
Abstract Lone wolf terrorists pose a large threat to modern society. The current ability to
identify and stop these kinds of terrorists before they commit a terror act is limited since they …
identify and stop these kinds of terrorists before they commit a terror act is limited since they …
The past, present, and future of online child sexual exploitation: Summarizing the evolution of production, distribution, and detection
BG Westlake - The Palgrave handbook of international cybercrime …, 2020 - Springer
The sexual exploitation of children has long been a component of society. With the advent of
the Internet, along with advancements of, and accessibility to, media-recording devices …
the Internet, along with advancements of, and accessibility to, media-recording devices …
The ethics of web crawling and web scraping in cybercrime research: Navigating issues of consent, privacy, and other potential harms associated with automated data …
R Brewer, B Westlake, T Hart, O Arauza - … : methodologies, ethics, and …, 2021 - Springer
The abundance of data easily accessible on the internet has made it an appealing domain
for conducting social science research. Because of the volume of data available, automated …
for conducting social science research. Because of the volume of data available, automated …
[HTML][HTML] iCOP: Live forensics to reveal previously unknown criminal media on P2P networks
The increasing levels of criminal media being shared in peer-to-peer (P2P) networks pose a
significant challenge to law enforcement agencies. One of the main priorities for P2P …
significant challenge to law enforcement agencies. One of the main priorities for P2P …
Searching for extremist content online using the dark crawler and sentiment analysis
R Scrivens, T Gaudette, G Davies… - Methods of criminology …, 2019 - emerald.com
Purpose–This chapter examines how sentiment analysis and web-crawling technology can
be used to conduct large-scale data analyses of extremist content online. Methods/approach …
be used to conduct large-scale data analyses of extremist content online. Methods/approach …
Analysis of weak signals for detecting lone wolf terrorists
Lone wolf terrorists pose a large threat to modern society. The current ability to identify and
stop these kind of terrorists before they commit a terror act is limited since they are very hard …
stop these kind of terrorists before they commit a terror act is limited since they are very hard …
Assessing the validity of automated webcrawlers as data collection tools to investigate online child sexual exploitation
The distribution of child sexual exploitation (CE) material has been aided by the growth of
the Internet. The graphic nature and prevalence of the material has made researching and …
the Internet. The graphic nature and prevalence of the material has made researching and …
Comparing methods for detecting child exploitation content online
The sexual exploitation of children online is seen as a global issue and has been addressed
by both governments and private organizations. Efforts thus far have focused primarily on …
by both governments and private organizations. Efforts thus far have focused primarily on …