Items where Author is "Peersman, Claudia"

Group by: Item Type | No Grouping
Number of items: 6.

Journal Article

Peersman, Claudia and Schulze, Christian and Rashid, Awais and Brennan, Margaret and Fischer, Carl (2016) iCOP : live forensics to reveal previously unknown criminal media on P2P networks. Digital Investigation, 18. pp. 50-64. ISSN 1742-2876

Contribution in Book/Report/Proceedings

Whitty, Monica and Edwards, Matthew John and Levi, Michael and Peersman, Claudia and Rashid, Awais and Sasse, Angela and Sorell, Tom and Stringhini, Gianluca (2017) Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF). In: Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017), co-located with the International Conference on World Wide Web (WWW) :. ACM, New York, pp. 1311-1314. ISBN 9781450349147

Edwards, Matthew John and Peersman, Claudia and Rashid, Awais (2017) Scamming the scammers : towards automatic detection of persuasion in advance fee frauds. In: Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017) co-located with International Conference on World Wide Web (WWW) :. ACM, New York, pp. 1291-1299. ISBN 9781450349147

Peersman, Claudia and Schulze, Christian and Rashid, Awais and Brennan, Margaret and Fischer, Carl (2014) iCOP : automatically identifying new child abuse media in P2P networks. In: 2014 IEEE Symposium on Security and Privacy Workshops :. IEEE Publishing, pp. 124-131.

Thesis

Peersman, Claudia and Rashid, Awais and Baron, Alistair (2018) Detecting deceptive behaviour in the wild : text mining for online child protection in the presence of noisy and adversarial social media communications. PhD thesis, Lancaster University.

Report

Peersman, Claudia and Llanos, José Tomas and May-Chahal, Corinne and McConville, Ryan and Chowdhury, Partha Das and De Cristofaro, Emiliano (2023) Towards a Framework for Evaluating CSAM Prevention and Detection Tools in the Context of End-to-end-encryption Environments : a Case Study. [Report]

This list was generated on Fri Apr 25 00:38:57 2025 UTC.