Mostrando 10 resultados de: 10
Filtros aplicados
Publisher
2017 IEEE 2nd Ecuador Technical Chapters Meeting, ETCM 2017(2)
2018 5th International Conference on eDemocracy and eGovernment, ICEDEG 2018(1)
2020 International Symposium on Networks, Computers and Communications, ISNCC 2020(1)
Advances in Intelligent Systems and Computing(1)
IEEE Access(1)
Área temáticas
Otros problemas y servicios sociales(4)
Criminología(3)
Funcionamiento de bibliotecas y archivos(3)
Ciencias de la computación(2)
Ciencias sociales(1)
Área de conocimiento
Ciencias de la computación(6)
Inteligencia artificial(3)
Análisis de redes sociales(2)
Aprendizaje automático(1)
Ciencia social(1)
Gender and age classification based on human features to detect illicit activity in suspicious sites
Conference ObjectAbstract: We developed a method to recognize gender and age groups using facial features and upper body proporPalabras claves:Age group recognition, face recognition, Gender classification, human trafficking, Upper body proportions recognitionAutores:Edgar P. Torres, Myriam Hernández-Alvarez, Sergio L. GranizoFuentes:scopusDetection of Human Trafficking Ads in Twitter Using Natural Language Processing and Image Processing
Conference ObjectAbstract: Human trafficking that aims at the sexual exploitation of minors is a problem that affects the worldPalabras claves:Age group classification, Gender classification, Haar filters, human trafficking, SVM, Twitter addsAutores:Myriam Hernández-Alvarez, Sergio L. GranizoFuentes:scopusDetection of Possible Illicit Messages Using Natural Language Processing and Computer Vision on Twitter and Linked Websites
ArticleAbstract: Human trafficking is a global problem that strips away the dignity of millions of victims. CurrentlyPalabras claves:cnn, Features detection, image classification, Natural Language processing, SVMAutores:Ángel Leonardo Valdivieso Caraguay, Lorena Isabel Barona López, Myriam Hernández-Alvarez, Sergio L. GranizoFuentes:scopusDetection of possible human trafficking in twitter
Conference ObjectAbstract: Social networks in general and Twitter, in particular, have become criminal-friendly tools used to cPalabras claves:Deception detection, Features, HASHTAGS, human trafficking, Machine learning, semi-supervised learning, Social Network, TwitterAutores:Myriam Hernández-AlvarezFuentes:googlescopusA survey on situational awareness of ransomware attacks-detection and prevention parameters
ArticleAbstract: In recent years, cybercrime activities have grown significantly, compromising device security and jePalabras claves:information security, pbkp_rediction, ransomware, Situational awarenessAutores:Ángel Leonardo Valdivieso Caraguay, Juan A.Herrera Silva, Lorena Isabel Barona López, Myriam Hernández-AlvarezFuentes:scopusIdentifying human trafficking patterns online
Conference ObjectAbstract: Human trafficking is a major concern worldwide which has evolved with the use of the Internet. IllicPalabras claves:Data Mining, human trafficking, illicit domains, information extraction, Machine learning, SOCIAL NETWORKSAutores:Danilo Burbano, Myriam Hernández-AlvarezFuentes:scopusIllicit, Hidden Advertisements on Twitter
Conference ObjectAbstract: Modern communication is ubiquitous thanks to the advances in mobile devices and the spread of socialPalabras claves:Data Mining, human trafficking, illicit services, information extraction, SOCIAL NETWORKS, TwitterAutores:Danilo Burbano, Myriam Hernández-AlvarezFuentes:scopusLarge scale ransomware detection by cognitive security
Conference ObjectAbstract: Attacks of Ransomware [14] are increasing every day. This type of threads explodes the system vulnerPalabras claves:classification, Data Mining, LOGS, Machine learning, ransomwareAutores:Juan A.Herrera Silva, Myriam Hernández-AlvarezFuentes:scopusThe evolution from traditional to intelligent web security: Systematic literature review
Conference ObjectAbstract: Information security is fundamental in the area of computing science with new metrics and technologiPalabras claves:attacks, Cross-site script, Defacement, Denial of Service, vulnerabilities, Web SecurityAutores:Hugo Oswaldo Moreno, Myriam Hernández-AlvarezFuentes:scopusSurvey about citation context analysis: Tasks, techniques, and resources
ArticleAbstract: Bibliometric calculations currently used to assess the quality of researchers, articles, and scientiPalabras claves:Autores:Gomez Soriano J.M., Myriam Hernández-AlvarezFuentes:googlescopus