Mostrar el registro sencillo del ítem

Ponencia

dc.contributor.editorVarela Vaca, Ángel Jesúses
dc.contributor.editorCeballos Guerrero, Rafaeles
dc.contributor.editorReina Quintero, Antonia Maríaes
dc.creatorAl-Nabki, MHD Wesames
dc.creatorJáñez Martino, Franciscoes
dc.creatorFidalgo, Eduardoes
dc.creatorAlegre, Enriquees
dc.creatorAláiz Rodríguez, Rocíoes
dc.date.accessioned2024-08-28T08:50:49Z
dc.date.available2024-08-28T08:50:49Z
dc.date.issued2024
dc.identifier.citationAl-Nabki, .W., Jáñez Martino, F., Fidalgo, E., Alegre, E. y Aláiz Rodríguez, R. (2024). A review of Spotting Child Sexual Exploitation Material using File Names and their Path [Póster]. En Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla) (502-503), Sevilla: Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática.
dc.identifier.isbn978-84-09-62140-8es
dc.identifier.urihttps://hdl.handle.net/11441/162075
dc.description.abstractLaw Enforcement Agencies (LEAs) fight the pro duction and distribution of Child Sexual Exploitation Material (CSEM) daily. Typically, the LEAs engage in manual analysis of the content stored on seized devices suspected of containing CSEM data. This task is complex and time-consuming because of the number of files and the obfuscation and patterns that sexual offenders might use in the file names. We proposed two Natural Language Processing approaches: f irst, training two text classifiers—one dedicated to analyzing f ilenames and the other to examining absolute paths—and then merging their output into a single output. The second uses only the filename classifier recursively over the absolute path. Moreover, we incorporated in both approaches three novel features to enrich the character n-gram representation before training four machine learning classifiers and two Convolutional Neural Networks (CNN). For CSEM detection, we recommend a CNN model combining both approaches, with an F1-score of 0,988, which was integrated into the tool built in the European Project: Global Response Against Child Exploitation (GRACE).es
dc.formatapplication/pdfes
dc.format.extent2es
dc.language.isoenges
dc.publisherUniversidad de Sevilla. Escuela Técnica Superior de Ingeniería Informáticaes
dc.relation.ispartofJornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla) (2024), pp. 502-503.
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectChild Sexual Abusees
dc.subjectChild Sexual Exploitation Materiales
dc.subjectCybercrimees
dc.subjectShort Text Classificationes
dc.titleA review of Spotting Child Sexual Exploitation Material using File Names and their Path [Póster]es
dc.typeinfo:eu-repo/semantics/conferenceObjectes
dc.type.versioninfo:eu-repo/semantics/publishedVersiones
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.publication.initialPage502es
dc.publication.endPage503es
dc.eventtitleJornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla)es
dc.eventinstitutionSevillaes
dc.relation.publicationplaceSevillaes

FicherosTamañoFormatoVerDescripción
JNIC24_520.pdf430.7KbIcon   [PDF] Ver/Abrir  

Este registro aparece en las siguientes colecciones

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como: Attribution-NonCommercial-NoDerivatives 4.0 Internacional