Literatura académica sobre el tema "Abuse detection"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Abuse detection".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Abuse detection"
Kiyohara, Sheri M. "Child Abuse Detection". Journal of Child Sexual Abuse 4, n.º 2 (septiembre de 1995): 105–8. http://dx.doi.org/10.1300/j070v04n02_07.
Texto completoA. Harries, Priscilla, Miranda L. Davies, Kenneth J. Gilhooly, Mary L.M. Gilhooly y Deborah Cairns. "Detection and prevention of financial abuse against elders". Journal of Financial Crime 21, n.º 1 (20 de diciembre de 2013): 84–99. http://dx.doi.org/10.1108/jfc-05-2013-0040.
Texto completode la Parte-Serna, Alejandro Carlos, Gonzalo Oliván-Gonzalvo, Cosmina Raluca Fratila, Mariona Hermoso-Vallespí, Andrea Peiró-Aubalat y Ricardo Ortega-Soria. "The dark side of Paediatric dentistry: Child abuse". Iberoamerican Journal of Medicine 2, n.º 3 (5 de abril de 2020): 194–200. http://dx.doi.org/10.53986/ibjm.2020.0035.
Texto completoMarlinda, Evy, Syamsul Firdaus y Haitami Haitami. "DILAN (DETEKSI DINI-LANJUT) NARKOBA PELAJAR SMPN-3 KECAMATAN CEMPAKA KOTA BANJARBARU". Jurnal Rakat Sehat : Pengabdian Kepada Masyarakat 1, n.º 1 (22 de abril de 2022): 14–19. http://dx.doi.org/10.31964/jrs.v1i1.5.
Texto completoCoyne, John F., David King, Steven Garin y Allen Fred Fielding. "Detection of child abuse". British Journal of Oral and Maxillofacial Surgery 35, n.º 6 (diciembre de 1997): 448. http://dx.doi.org/10.1016/s0266-4356(97)90755-5.
Texto completoRohringer, Taryn J., Tony E. Rosen, Mihan R. Lee, Pallavi Sagar y Kieran J. Murphy. "Can diagnostic imaging help improve elder abuse detection?" British Journal of Radiology 93, n.º 1110 (junio de 2020): 20190632. http://dx.doi.org/10.1259/bjr.20190632.
Texto completoBahrami, Pouneh Nikkhah, Umar Iqbal y Zubair Shafiq. "FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting". Proceedings on Privacy Enhancing Technologies 2022, n.º 2 (3 de marzo de 2022): 557–77. http://dx.doi.org/10.2478/popets-2022-0056.
Texto completoXu, Shujuan, Biao Ma, Jiali Li, Wei Su, Tianran Xu y Mingzhou Zhang. "Europium Nanoparticles-Based Fluorescence Immunochromatographic Detection of Three Abused Drugs in Hair". Toxics 11, n.º 5 (29 de abril de 2023): 417. http://dx.doi.org/10.3390/toxics11050417.
Texto completoBrown, Sarah D., Greg Brack y Frances Y. Mullis. "Traumatic Symptoms in Sexually Abused Children: Implications for School Counselors". Professional School Counseling 11, n.º 6 (agosto de 2008): 2156759X0801100. http://dx.doi.org/10.1177/2156759x0801100603.
Texto completoS, Srividya M., Anala M. R y Chetan Tayal. "Deep learning techniques for physical abuse detection". IAES International Journal of Artificial Intelligence (IJ-AI) 10, n.º 4 (1 de diciembre de 2021): 971. http://dx.doi.org/10.11591/ijai.v10.i4.pp971-981.
Texto completoTesis sobre el tema "Abuse detection"
Abbott, R. W. "HPLC of drugs of abuse with chemiluminescence detection". Thesis, University of Hull, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.384671.
Texto completoLamping, Sarah Louise. "Study of SERS for the detection of drugs of abuse". Thesis, University of Strathclyde, 2008. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=21989.
Texto completoFaulds, Karen Jade. "Detection of drugs of abuse by surface enhanced Raman scattering (SERS)". Thesis, University of Strathclyde, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288636.
Texto completoBadiru, Shewu Oladapo. "Chromatographic studies on the detection of some basic drugs of abuse". Thesis, University of Bath, 1989. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.234086.
Texto completoMansell, Sheila L. "Sexual abuse detection, sequelae, and therapy accommodations for people with developmental disabilities". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/nq23027.pdf.
Texto completoWang, Ling. "Applications of Paper Microfluidic Systems in the Field Detection of Drugs of Abuse". FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3381.
Texto completoCécillon, Noé. "Combining Graph and Text to Model Conversations : An Application to Online Abuse Detection". Electronic Thesis or Diss., Avignon, 2024. http://www.theses.fr/2024AVIG0100.
Texto completoOnline abusive behaviors can have devastating consequences on individuals and communities. With the global expansion of internet and the social networks, anyone can be confronted with these behaviors. Over the past few years, laws and regulations have been established to regulate this kind of abuse but the responsibility ultimately lies with the platforms that host online communications. They are asked to monitor their users in order to prevent the proliferation of abusive content. Timely detection and moderation is a key factor to reduce the quantity and impact of abusive behaviors. However, due to the sheer quantity of online messages posted every day, platforms struggle to provide adequate resources. Since this implies high human and financial costs, companies have a keen interest in automating this process. Although it may seem a relatively simple task, it turns out to be quite complex. Indeed, malicious users have developed numerous techniques to bypass the standard automated methods. Allusions or implied meaning are other examples of strategies that automatic methods struggle to detect. While usually performed on individual messages taken out of their context, it has been shown that automatic abuse detection can benefit from considering the context in which the message was posted. In this thesis, we want to focus on the combination of content and structure of conversations to tackle the abuse detection task. Using the textual content of messages is the standard approach which was first developed in the literature. It has the advantage of being easy to set up, but on the other hand, it is vulnerable to text-based attacks such as obfuscation. The structure of the conversation which represent the context is less frequently used as it is more complicated to manipulate. Yet it allows to introduce a contextual aspect which helps detecting abuse occurrences when the text on its own is not sufficient. This context can be modeled as a contextual graph representing the conversation which includes the message. By comparing two methods based on feature engineering on a dataset of conversations extracted from a video games, we could show that a method relying exclusively on conversational graphs and ignoring the content was able to obtain better detection performance. The literature suggest that combining multiple modalities often result in a better detection of abusive messages. We propose multiple strategies to combine the content and structure of conversations and prove that their combination is indeed beneficial to the detection. A limitation of feature-based methods is that they are costly in time and computational resources. Our study also highlights that only a fraction of the computed features are truly relevant for the task. Representation learning methods can be used to mitigate these issues by automatically learning the representations of text and conversational graphs. For graphs, we demonstrated that using edge weights, signs and directions improved the performance. As no method exists for signed whole-graph embedding, we fill this gap in the literature by developing two such methods. We assess them on a newly constituted benchmark of three datasets of signed graphs and show that they perform better than their unsigned counterparts. Lastly, we perform a comparative study of several lexical and graph-embedding method for abuse detection by applying them to our dataset of conversations. Our results show that they perform better than feature-based approaches on text and are slightly less effective on graphs. Still, they obtain promising results given that they are completely task independent, much more scalable and time-efficient than feature-based approaches
Yang, Li. "A comparison of unsupervised learning techniques for detection of medical abuse in automobile claims". California State University, Long Beach, 2013.
Buscar texto completoMwenesongole, Ellen Musili. "Simultaneous detection of drugs of abuse in waste water using gas chromatography-mass spectrometry". Thesis, Anglia Ruskin University, 2015. http://arro.anglia.ac.uk/550378/.
Texto completoLow, Ann Stewart. "An evaluation of analytical procedures for detection of drug abuse with particular reference to opiates". Thesis, Robert Gordon University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.242985.
Texto completoLibros sobre el tema "Abuse detection"
Mwiti, Gladys. Child abuse: Detection, prevention, and counselling. Nairobi, Kenya: Evangel Pub. House, 2006.
Buscar texto completoMedical Express. Professional Development Center., ed. The prevention and detection of elder abuse. San Diego, CA (12235 El Camino Real, Suite 200, San Diego 92130): MedicalExpress Professional Development Center, 2000.
Buscar texto completoMedical Express. Professional Development Center., ed. The prevention and detection of elder abuse. San Diego, CA (12235 El Camino Real, Suite 200, San Diego 92130): MedicalExpress Professional Development Center, 2000.
Buscar texto completoMedical Express. Professional Development Center., ed. The prevention and detection of elder abuse. San Diego, CA (12235 El Camino Real, Suite 200, San Diego 92130): MedicalExpress Professional Development Center, 2000.
Buscar texto completoBonnie, Brandl, ed. Elder abuse detection and intervention: A collaborative approach. New York: Springer, 2007.
Buscar texto completoOccult crime: Detection, investigation, and verification. Las Vegas, N.M: San Miguel Press, 1992.
Buscar texto completoMiller, Gary J. Drugs and the law: Detection, recognition & investigation. [Altamonte Springs, FL]: Gould Publications, 1992.
Buscar texto completoMiller, Gary J. Drugs and the law: Detection, recognition & investigation. Charlottesville, VA: LexisNexis, 2014.
Buscar texto completoEarly detection and treatment of substance abuse within integrated primary care. Reno, NV: Context Press, 2006.
Buscar texto completoA, Burtonwood C. y Great Britain. Medicines and Healthcare products Regulatory Agency., eds. Sixteen devices for the detection of drugs of abuse in urine. London: MRHA, 2003.
Buscar texto completoCapítulos de libros sobre el tema "Abuse detection"
Kumar, Ayush, Aryan Nigam, Aradhana Tripathi, Aftab Khan, Nigam Kumar Mishra y Rochak Bajpai. "Real-time-abuse detection model". En Advances in AI for Biomedical Instrumentation, Electronics and Computing, 595–99. London: CRC Press, 2024. http://dx.doi.org/10.1201/9781032644752-108.
Texto completoKong, Chao, Jianye Liu, Hao Li, Ying Liu, Haibei Zhu y Tao Liu. "Drug Abuse Detection via Broad Learning". En Web Information Systems and Applications, 499–505. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30952-7_49.
Texto completoChen, Yizheng, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Wenke Lee y Michael Farrell. "Financial Lower Bounds of Online Advertising Abuse". En Detection of Intrusions and Malware, and Vulnerability Assessment, 231–54. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40667-1_12.
Texto completoRao, Udai Pratap y Nikhil Kumar Singh. "Detection of Privilege Abuse in RBAC Administered Database". En Studies in Computational Intelligence, 57–76. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-14654-6_4.
Texto completoSchänzer, Wilhelm. "Abuse of androgens and detection of illegal use". En Testosterone, 545–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/978-3-642-72185-4_20.
Texto completoPapegnies, Etienne, Vincent Labatut, Richard Dufour y Georges Linarès. "Graph-Based Features for Automatic Online Abuse Detection". En Statistical Language and Speech Processing, 70–81. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68456-7_6.
Texto completoNelson, Anne E. y Ken K. Y. Ho. "Detection of Growth Hormone Doping in Sport Using Growth Hormone-Responsive Markers". En Hormone Use and Abuse by Athletes, 139–50. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7014-5_15.
Texto completoBelkowski, Stanley M., Jinmin Zhu, Lee Y. Liu-Chen, Toby K. Eisenstein, Martin W. Adler y Thomas J. Rogers. "Detection of К-Opioid Receptor mRNA in Immature T Cells". En The Brain Immune Axis and Substance Abuse, 11–16. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-1-4615-1951-5_2.
Texto completoPapegnies, Etienne, Vincent Labatut, Richard Dufour y Georges Linarès. "Impact of Content Features for Automatic Online Abuse Detection". En Computational Linguistics and Intelligent Text Processing, 404–19. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77116-8_30.
Texto completoGarcía-Recuero, Álvaro, Jeffrey Burdges y Christian Grothoff. "Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks". En Data Privacy Management and Security Assurance, 78–93. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47072-6_6.
Texto completoActas de conferencias sobre el tema "Abuse detection"
Sharon, Rini, Heet Shah, Debdoot Mukherjee y Vikram Gupta. "Multilingual and Multimodal Abuse Detection". En Interspeech 2022. ISCA: ISCA, 2022. http://dx.doi.org/10.21437/interspeech.2022-10629.
Texto completoWang, Andrew Z., Rex Ying, Pan Li, Nikhil Rao, Karthik Subbian y Jure Leskovec. "Bipartite Dynamic Representations for Abuse Detection". En KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3447548.3467141.
Texto completoFa, Zhou, Guang-Gang Geng, Zhi-Wei Yan y Xiao-Dong Lee. "A robust internet abuse detection method". En 2017 IEEE International Conference on Big Data (Big Data). IEEE, 2017. http://dx.doi.org/10.1109/bigdata.2017.8258113.
Texto completoWhiton, Adam y Yolita Nugent. "A Wearable for Physical Abuse Detection". En 2007 11th IEEE International Symposium on Wearable Computers. IEEE, 2007. http://dx.doi.org/10.1109/iswc.2007.4373796.
Texto completoGupta, Vikram, Rini Sharon, Ramit Sawhney y Debdoot Mukherjee. "ADIMA: Abuse Detection In Multilingual Audio". En ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2022. http://dx.doi.org/10.1109/icassp43922.2022.9746718.
Texto completoMedvedeva, Marina. "AUTOMATIC DETECTION OF ABUSE ON SOCIAL MEDIA". En 16th International Multidisciplinary Scientific GeoConference SGEM2016. Stef92 Technology, 2016. http://dx.doi.org/10.5593/sgem2016/b21/s07.013.
Texto completoThakran, Yash y Vinayak Abrol. "Investigating Acoustic Cues for Multilingual Abuse Detection". En INTERSPEECH 2023. ISCA: ISCA, 2023. http://dx.doi.org/10.21437/interspeech.2023-1311.
Texto completoPalanikumar, Vasanth, Sean Benhur, Adeep Hande y Bharathi Raja Chakravarthi. "DE-ABUSE@TamilNLP-ACL 2022: Transliteration as Data Augmentation for Abuse Detection in Tamil". En Proceedings of the Second Workshop on Speech and Language Technologies for Dravidian Languages. Stroudsburg, PA, USA: Association for Computational Linguistics, 2022. http://dx.doi.org/10.18653/v1/2022.dravidianlangtech-1.5.
Texto completoMalte, Aditya y Pratik Ratadiya. "Multilingual Cyber Abuse Detection using Advanced Transformer Architecture". En TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON). IEEE, 2019. http://dx.doi.org/10.1109/tencon.2019.8929493.
Texto completoFounta, Antigoni Maria, Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Athena Vakali y Ilias Leontiadis. "A Unified Deep Learning Architecture for Abuse Detection". En the 10th ACM Conference. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3292522.3326028.
Texto completoInformes sobre el tema "Abuse detection"
Peter W. Carr, K.M. Fuller, D.R. Stoll, L.D. Steinkraus, M.S. Pasha y Glenn G. Hardin. Fast Gradient Elution Reversed-Phase HPLC with Diode-Array Detection as a High Throughput Screening Method for Drugs of Abuse. Office of Scientific and Technical Information (OSTI), diciembre de 2005. http://dx.doi.org/10.2172/892807.
Texto completoBecker, David, Daniel Kessler y Mark McClellan. Detecting Medicare Abuse. Cambridge, MA: National Bureau of Economic Research, agosto de 2004. http://dx.doi.org/10.3386/w10677.
Texto completoBotulinum Neurotoxin-Producing Clostridia, Working Group on. Report on Botulinum Neurotoxin-Producing Clostridia. Food Standards Agency, agosto de 2023. http://dx.doi.org/10.46756/sci.fsa.ozk974.
Texto completoSteinman, Dave, Mike Celiceo y Joe Head. Stopping Insider Abuse and Spying. Detecting the Hard Stuff: Stolen Passwords Unauthorized Records Browsing, Employee Espionage, Infiltration, and Insertion of Unwelcome Code, via Automatic Behavior Profiling. Fort Belvoir, VA: Defense Technical Information Center, junio de 1999. http://dx.doi.org/10.21236/ada385478.
Texto completo