Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Mhd Wesam Al Nabki"'
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-9 (2023)
Abstract Producing or sharing Child Sexual Exploitation Material (CSEM) is a severe crime that Law Enforcement Agencies (LEAs) fight daily. When the LEA seizes a computer from a potential producer or consumer of the CSEM, it analyzes the storage devi
Externí odkaz:
https://doaj.org/article/2492a5adff9d44b8b17d52b036ca6b46
Author Correction: Short text classification approach to identify child sexual exploitation material
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-1 (2023)
Externí odkaz:
https://doaj.org/article/7aee92d7cfe84fb3aa34441e7fc3c590
Improving named entity recognition in noisy user-generated text with local distance neighbor feature
Publikováno v:
Neurocomputing. 382:1-11
Recognizing infrequent or emerging named entities in a user-generated text is a challenging task, especially when informal or slang text is used. Some recent works propose to use a gazetteer to solve this problem, but this solution is not general bec
Publikováno v:
Expert Systems with Applications. 123:212-226
The Tor network hosts a significant amount of hidden services related to suspicious activities. Law Enforcement Agencies need to monitor and to investigate crimes hidden behind the anonymity provided by Tor. In this paper, we propose a new algorithm,
Publikováno v:
RUC. Repositorio da Universidade da Coruña
instname
instname
[Abstract] Text Spotting can be used as an approach to retrieve information found in images that cannot be obtained otherwise, by performing text detection rst and then recognizing the located text. Examples of images to apply this task on can be fou
Publikováno v:
ICPRAM
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030298586
HAIS
HAIS
Online notepad services allow users to upload and share free text anonymously. Reviewing Pastebin, one of the most popular online notepad services websites, it is possible to find textual content that could be related to illegal activities, such as l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5477a2cc917994189df17c49d1a81f1d
https://doi.org/10.1007/978-3-030-29859-3_39
https://doi.org/10.1007/978-3-030-29859-3_39
Autor:
David Matilla, Mhd Wesam Al-Nabki, Laura Fernández-Robles, Víctor González-Castro, Eduardo Fidalgo
Publikováno v:
RUC. Repositorio da Universidade da Coruña
instname
instname
[Abstract] Dark Web, i.e. the portion of the Web whose content is not indexed either accessible by standard web browsers, comprises several darknets. The Onion Router (Tor) is the most famous one, thanks to the anonymity provided to its users, and it
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a7377ad81fd46c7ee289b17b7c88c075
https://hdl.handle.net/2183/24884
https://hdl.handle.net/2183/24884
Publikováno v:
RUC. Repositorio da Universidade da Coruña
instname
instname
[Abstract] Due to the efforts of different authorities in the fight against illegal activities in the Tor networks, the traders have developed new ways of circumventing the monitoring tools used to obtain evidence of said activities. In particular, e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0af70c511300fac462649410896fae00
https://hdl.handle.net/2183/24876
https://hdl.handle.net/2183/24876
Publikováno v:
Scopus-Elsevier
EACL (1)
EACL (1)
The freedom of the Deep Web offers a safe place where people can express themselves anonymously but they also can conduct illegal activities. In this paper, we present and make publicly available a new dataset for Darknet active domains, which we cal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ac14828d275ae38819437706a7094e21
http://www.scopus.com/inward/record.url?eid=2-s2.0-85021627891&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-85021627891&partnerID=MN8TOARS