<--- Back to Details
First PageDocument Content
File sharing networks / Sexual abuse / Peer-to-peer / Child pornography / ANts P2P / HTTP / Child sexual abuse / Social peer-to-peer processes / Concurrent computing / Distributed computing / Computing
Date: 2014-04-30 03:11:09
File sharing networks
Sexual abuse
Peer-to-peer
Child pornography
ANts P2P
HTTP
Child sexual abuse
Social peer-to-peer processes
Concurrent computing
Distributed computing
Computing

2014 IEEE Security and Privacy Workshops iCOP: Automatically Identifying New Child Abuse Media in P2P Networks Claudia Peersman∗ , Christian Schulze† , Awais Rashid∗ , Margaret Brennan‡ and Carl Fischer∗ ∗ S

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 390,16 KB

Share Document on Facebook

Similar Documents

Distributed Computing Prof. R. Wattenhofer BA/MA/SA:  A Hybrid Blockchain System

Distributed Computing Prof. R. Wattenhofer BA/MA/SA: A Hybrid Blockchain System

DocID: 1xVNV - View Document

Distributed Computing Prof. R. Wattenhofer SA/MA:  Byzantine Reinforcement Learning

Distributed Computing Prof. R. Wattenhofer SA/MA: Byzantine Reinforcement Learning

DocID: 1xVKs - View Document

Distributed Computing Prof. R. Wattenhofer Activity Recognition and Adversarial Learning with Smartwatches

Distributed Computing Prof. R. Wattenhofer Activity Recognition and Adversarial Learning with Smartwatches

DocID: 1xVFo - View Document

Distributed Computing Prof. R. Wattenhofer BA/SA/Group/Lab:  Dynamic Directories

Distributed Computing Prof. R. Wattenhofer BA/SA/Group/Lab: Dynamic Directories

DocID: 1xVCB - View Document

Distributed Computing Prof. R. Wattenhofer Advanced Topics in Deep Learning - Disentangled Representations

Distributed Computing Prof. R. Wattenhofer Advanced Topics in Deep Learning - Disentangled Representations

DocID: 1xVwm - View Document