From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Conversation Level Constraints on Pedophile Detection in Chat Rooms., , , и . CLEF (Online Working Notes/Labs/Workshop), том 1178 из CEUR Workshop Proceedings, CEUR-WS.org, (2012)How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces., , , , , и . CoRR, (2022)Detecting deceptive behaviour in the wild: text mining for online child protection in the presence of noisy and adversarial social media communications.. Lancaster University, UK, (2018)British Library, EThOS.The Netlog Corpus. A Resource for the Study of Flemish Dutch Internet Language., , , , , , , , и . LREC, стр. 1569-1572. European Language Resources Association (ELRA), (2012)Characterising Cybercriminals: A Review., , , и . CoRR, (2022)A Survey of Relevant Text Mining Technology., , , и . CoRR, (2022)Predicting age and gender in online social networks., , и . SMUC, стр. 37-44. ACM, (2011)Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF)., , , , , , , и . WWW (Companion Volume), стр. 1311-1314. ACM, (2017)Scoping the Cyber Security Body of Knowledge., , , , , , и . IEEE Secur. Priv., 16 (3): 96-102 (2018)The Effects of Age, Gender and Region on Non-standard Linguistic Variation in Online Social Networks., , , , и . CoRR, (2016)