Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A human-centered systematic literature review of the computational approaches for online sexual risk detection
In the era of big data and artificial intelligence, online risk detection has become a popular
research topic. From detecting online harassment to the sexual predation of youth, the state …
research topic. From detecting online harassment to the sexual predation of youth, the state …
Exploring issues surrounding a safe and conducive digital learning space in Nepal: A preparation for online education in the post-pandemic era
B Lamsal - Socioeconomic inclusion during an era of online …, 2022 - igi-global.com
A conducive and safe digital learning space has become a prominent concern in the present
pandemic situation since most teachers and students are engaged in the online mode of …
pandemic situation since most teachers and students are engaged in the online mode of …
[HTML][HTML] Using deep learning to detect social media 'trolls'
Detecting criminal activity online is not a new concept but how it can occur is changing.
Technology and the influx of social media applications and platforms has a vital part to play …
Technology and the influx of social media applications and platforms has a vital part to play …
Uncovering cybercrimes in social media through natural language processing
J Ramírez Sánchez, A Campo-Archbold… - …, 2021 - Wiley Online Library
Among the myriad of applications of natural language processing (NLP), assisting law
enforcement agencies (LEA) in detecting and preventing cybercrimes is one of the most …
enforcement agencies (LEA) in detecting and preventing cybercrimes is one of the most …
A model of policing strategy choice: The integration of the Latent Dirichlet Allocation (LDA) method with ELECTRE I
Purpose The purpose of this paper is to develop a method for the discovery of knowledge in
emergency response databases based on police incident reports, generating information …
emergency response databases based on police incident reports, generating information …
Predicting cyber offenders and victims and their offense and damage time from routine chat times and online social network activities
Predicting offenders and victims and the timing of their offenses and damages has become a
perennial challenge in global cyberspace. This study aimed to solve this challenge through …
perennial challenge in global cyberspace. This study aimed to solve this challenge through …
Empirical and Experimental Insights into Data Mining Techniques for Crime Prediction: A Comprehensive Survey
K Taha - ACM Transactions on Intelligent Systems and …, 2024 - dl.acm.org
This survey paper presents a comprehensive analysis of crime prediction methodologies,
exploring the various techniques and technologies utilized in this area. The paper covers the …
exploring the various techniques and technologies utilized in this area. The paper covers the …
CBR‐Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data‐Driven Website Defacement Analysis
Criminal profiling is a useful technique to identify the most plausible suspects based on the
evidence discovered at the crime scene. Similar to offline criminal profiling, in‐depth …
evidence discovered at the crime scene. Similar to offline criminal profiling, in‐depth …
Cybercrime's tendencies of the teenagers in the COVID-19 era: assessing the influence of mobile games, social networks and religious attitudes
Y Li, J Li, Q Fan, Z Wang - Kybernetes, 2022 - emerald.com
Purpose The teenager community is the most affected community by cybercrime in the
COVID-19 era. Increasing social networks and facilitating teenager access to the Internet …
COVID-19 era. Increasing social networks and facilitating teenager access to the Internet …
Integrated content-network analysis to discover influential collectives for studying social cyber-threats from online social movements
F Amro, H Purohit - Social Network Analysis and Mining, 2023 - Springer
Recent online social movements with offline violence events have been linked to activities of
threat actors that exploit online social networks to instigate violence, among other ills. In …
threat actors that exploit online social networks to instigate violence, among other ills. In …