dc.contributor.editor | Varela Vaca, Ángel Jesús | es |
dc.contributor.editor | Ceballos Guerrero, Rafael | es |
dc.contributor.editor | Reina Quintero, Antonia María | es |
dc.creator | Al-Nabki, MHD Wesam | es |
dc.creator | Jáñez Martino, Francisco | es |
dc.creator | Fidalgo, Eduardo | es |
dc.creator | Alegre, Enrique | es |
dc.creator | Aláiz Rodríguez, Rocío | es |
dc.date.accessioned | 2024-08-28T08:50:49Z | |
dc.date.available | 2024-08-28T08:50:49Z | |
dc.date.issued | 2024 | |
dc.identifier.citation | Al-Nabki, .W., Jáñez Martino, F., Fidalgo, E., Alegre, E. y Aláiz Rodríguez, R. (2024). A review of Spotting Child Sexual Exploitation Material using File Names and their Path [Póster]. En Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla) (502-503), Sevilla: Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática. | |
dc.identifier.isbn | 978-84-09-62140-8 | es |
dc.identifier.uri | https://hdl.handle.net/11441/162075 | |
dc.description.abstract | Law Enforcement Agencies (LEAs) fight the pro duction and distribution of Child Sexual Exploitation Material (CSEM) daily. Typically, the LEAs engage in manual analysis of the content stored on seized devices suspected of containing CSEM data. This task is complex and time-consuming because of the number of files and the obfuscation and patterns that sexual offenders might use in the file names. We proposed two Natural Language Processing approaches: f irst, training two text classifiers—one dedicated to analyzing f ilenames and the other to examining absolute paths—and then merging their output into a single output. The second uses only the filename classifier recursively over the absolute path. Moreover, we incorporated in both approaches three novel features to enrich the character n-gram representation before training four machine learning classifiers and two Convolutional Neural Networks (CNN). For CSEM detection, we recommend a CNN model combining both approaches, with an F1-score of 0,988, which was integrated into the tool built in the European Project: Global Response Against Child Exploitation (GRACE). | es |
dc.format | application/pdf | es |
dc.format.extent | 2 | es |
dc.language.iso | eng | es |
dc.publisher | Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática | es |
dc.relation.ispartof | Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla) (2024), pp. 502-503. | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | Child Sexual Abuse | es |
dc.subject | Child Sexual Exploitation Material | es |
dc.subject | Cybercrime | es |
dc.subject | Short Text Classification | es |
dc.title | A review of Spotting Child Sexual Exploitation Material using File Names and their Path [Póster] | es |
dc.type | info:eu-repo/semantics/conferenceObject | es |
dc.type.version | info:eu-repo/semantics/publishedVersion | es |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | es |
dc.publication.initialPage | 502 | es |
dc.publication.endPage | 503 | es |
dc.eventtitle | Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla) | es |
dc.eventinstitution | Sevilla | es |
dc.relation.publicationplace | Sevilla | es |