[go: up one dir, main page]

Follow
Claudia Peersman
Title
Cited by
Cited by
Year
Predicting age and gender in online social networks
C Peersman, W Daelemans, L Van Vaerenbergh
Proceedings of the 3rd international workshop on Search and mining user …, 2011
4402011
Automatically dismantling online dating fraud
G Suarez-Tangil, M Edwards, C Peersman, G Stringhini, A Rashid, ...
IEEE Transactions on Information Forensics and Security 15, 1128-1137, 2019
1312019
Scoping the cyber security body of knowledge
A Rashid, G Danezis, H Chivers, E Lupu, A Martin, M Lewis, C Peersman
IEEE Security & Privacy 16 (3), 96-102, 2018
1002018
iCOP: Live forensics to reveal previously unknown criminal media on P2P networks
C Peersman, C Schulze, A Rashid, M Brennan, C Fischer
Digital Investigation 18, 50-64, 2016
712016
Towards forensic-ready software systems
L Pasquale, D Alrajeh, C Peersman, T Tun, B Nuseibeh, A Rashid
Proceedings of the 40th international conference on software engineering …, 2018
562018
Fine-grained emotion detection in suicide notes: A thresholding approach to multi-label classification
K Luyckx, F Vaassen, C Peersman, W Daelemans
Biomedical informatics insights 5, BII. S8966, 2012
522012
The geography of online dating fraud
M Edwards, G Suaraz-Tangil, C Peersman, G Stringhini, A Rashid, ...
Workshop on Technology and Consumer Protection 2018, 2018
472018
Scamming the scammers: towards automatic detection of persuasion in advance fee frauds
M Edwards, C Peersman, A Rashid
Proceedings of the 26th International Conference on World Wide Web Companion …, 2017
432017
Conversation Level Constraints on Pedophile Detection in Chat Rooms.
C Peersman, F Vaassen, V Van Asch, W Daelemans
CLEF (Online working notes/labs/workshop), 1-13, 2012
432012
icop: Automatically identifying new child abuse media in p2p networks
C Peersman, C Schulze, A Rashid, M Brennan, C Fischer
2014 IEEE Security and Privacy Workshops, 124-131, 2014
372014
The effects of age, gender and region on non-standard linguistic variation in online social networks
C Peersman, W Daelemans, R Vandekerckhove, B Vandekerckhove, ...
arXiv preprint arXiv:1601.02431, 2016
302016
Characterising cybercriminals: a review
M Edwards, E Williams, C Peersman, A Rashid
arXiv preprint arXiv:2202.07419, 2022
162022
The Netlog Corpus. A Resource for the Study of Flemish Dutch Internet Language.
M Kestemont, C Peersman, B De Decker, G De Pauw, K Luyckx, ...
LREC, 1569-1572, 2012
152012
The impact of adverse events in darknet markets: an anomaly detection approach
Z Ursani, C Peersman, M Edwards, C Chen, A Rashid
2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2021
132021
ABOP, automatic optimization of patient information leaflets
I Delaere, V Hoste, C Peersman, L Van Vaerenbergh, P Velaerts
Proceedings of the international symposium on data and sense mining, machine …, 2009
122009
Understanding motivations and characteristics of financially-motivated cybercriminals
C Peersman, E Williams, M Edwards, A Rashid
arXiv preprint arXiv:2203.08642, 2022
112022
Amoc: A multifaceted machine learning-based toolkit for analysing cybercriminal communities on the darknet
C Chen, C Peersman, M Edwards, Z Ursani, A Rashid
2021 IEEE International Conference on Big Data (Big Data), 2516-2524, 2021
112021
Tokyo, denver, helsinki, lisbon or the professor? a framework for understanding cybercriminal roles in darknet markets
C Peersman, D Pencheva, A Rashid
2021 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2021
112021
Detecting Deceptive Behaviour in the Wild: Text Mining for Online Child Protection in the Presence of Noisy and Adversarial Social Media Communications
C Peersman
Lancaster University, 2018
72018
Towards a framework for evaluating CSAM prevention and detection tools in the context of end-to-end encryption environments: A case study
C Peersman, JT Llanos, C May-Chahal, R McConville, PD Chowdhury, ...
REPHRAIN, 2023
62023
The system can't perform the operation now. Try again later.
Articles 1–20