Author of the publication

Networking in Child Exploitation: Assessing disruption strategies using registrant information.

, , , , and . ASONAM, page 400-407. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uncovering Tor: An Examination of the Network Structure., , , and . Secur. Commun. Networks, (2018)Exploring the structural characteristics of social networks in a large criminal court database., , and . ISI, page 209-214. IEEE, (2013)Sentiment-based Classification of Radical Text on the Web., and . EISIC, page 104-107. IEEE Computer Society, (2016)Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement., , , and . EISIC, page 75-82. IEEE, (2013)Comparing Methods for Detecting Child Exploitation Content Online., , and . EISIC, page 156-163. IEEE Computer Society, (2012)Identifying Digital Threats in a Hacker Web Forum., , , and . ASONAM, page 926-933. ACM, (2015)Identifying high risk crime areas using topology., , , , , and . ISI, page 13-18. IEEE, (2010)Deploying Artificial Intelligence to Combat Covid-19 Misinformation on Social Media: Technological and Ethical Considerations., , , , and . HICSS, page 2140-2149. ScholarSpace, (2023)Cards, Money and Two Hacking Forums: An Analysis of Online Money Laundering Schemes., and . EISIC, page 80-83. IEEE Computer Society, (2016)Finding Criminal Attractors Based on Offenders' Directionality of Crimes., , , and . EISIC, page 86-93. IEEE Computer Soecity, (2011)