4 Hits in 3.3 sec

Mining bipartite graphs to improve semantic pedophile activity detection

Raphael Fournier, Maximilien Danisch
2014 2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)  
Pedophile activity is a very important topic for our society and some works have recently attempted to gauge the extent of pedophile exchanges on P2P networks.  ...  We propose to use social network analysis in a large dataset from a P2P network to improve a state-of-the-art filter for pedophile queries.  ...  Thus, the topological study of a bipartite graph between users and queries from a P2P network can help to improve and update a semantic filter.  ... 
doi:10.1109/rcis.2014.6861035 dblp:conf/rcis/FournierD14 fatcat:xb5veusj5zaaxoomk7vjkxldzm

Threats from the Dark: A Review over Dark Web Investigation Research for Cyber Threat Intelligence

Randa Basheer, Bassel Alkhatib, Zhiyong Xu
2021 Journal of Computer Networks and Communications  
From proactive detection of cyberattacks to the identification of key actors, analyzing contents of the Dark Web plays a significant role in deterring cybercrimes and understanding criminal minds.  ...  Researching in the Dark Web proved to be an essential step in fighting cybercrime, whether with a standalone investigation of the Dark Web solely or an integrated one that includes contents from the Surface  ...  Furthermore, it takes advantage of the available metadata and posts' contents to explore trending tools. e framework applies bipartite SNA to detect key hackers in the communities. e constructed bipartite  ... 
doi:10.1155/2021/1302999 fatcat:w2kg4s2tsfholbf5lctv6wlzjm

Formal Concept Analysis in knowledge processing: A survey on models and techniques

Jonas Poelmans, Sergei O. Kuznetsov, Dmitry I. Ignatov, Guido Dedene
2013 Expert systems with applications  
We use the visualization capabilities of FCA to explore the literature, to discover and conceptually represent the main research topics in the FCA community.  ...  We developed a knowledge browsing environment to support our literature analysis process.  ...  Acknowledgements We are grateful to Paul Elzinga for his help in processing the papers and generating the context files on which the lattices are based.  ... 
doi:10.1016/j.eswa.2013.05.007 fatcat:july7aafprcjrbaely2swksvhi

Detecting Cyberbullying and Cyberaggression in Social Media [article]

Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali, Nicolas Kourtellis
2019 arXiv   pre-print
Victims can experience a wide range of emotions, with negative consequences such as embarrassment, depression, isolation from other community members, which embed the risk to lead to even more critical  ...  We analyze 1.2 million users and 2.1 million tweets, comparing users participating in discussions around seemingly normal topics like the NBA, to those more likely to be hate-related, such as the Gamergate  ...  The research leading to these results has received funding from the European Union's Marie Sklodowska-Curie grant agreement No 691025 (project EN-CASE).  ... 
arXiv:1907.08873v1 fatcat:4tkcdria2rhntg5lawcafeixxi