Literatura científica selecionada sobre o tema "Abuse detection"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Abuse detection".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Abuse detection"
Kiyohara, Sheri M. "Child Abuse Detection". Journal of Child Sexual Abuse 4, n.º 2 (setembro de 1995): 105–8. http://dx.doi.org/10.1300/j070v04n02_07.
Texto completo da fonteA. Harries, Priscilla, Miranda L. Davies, Kenneth J. Gilhooly, Mary L.M. Gilhooly e Deborah Cairns. "Detection and prevention of financial abuse against elders". Journal of Financial Crime 21, n.º 1 (20 de dezembro de 2013): 84–99. http://dx.doi.org/10.1108/jfc-05-2013-0040.
Texto completo da fontede la Parte-Serna, Alejandro Carlos, Gonzalo Oliván-Gonzalvo, Cosmina Raluca Fratila, Mariona Hermoso-Vallespí, Andrea Peiró-Aubalat e Ricardo Ortega-Soria. "The dark side of Paediatric dentistry: Child abuse". Iberoamerican Journal of Medicine 2, n.º 3 (5 de abril de 2020): 194–200. http://dx.doi.org/10.53986/ibjm.2020.0035.
Texto completo da fonteMarlinda, Evy, Syamsul Firdaus e Haitami Haitami. "DILAN (DETEKSI DINI-LANJUT) NARKOBA PELAJAR SMPN-3 KECAMATAN CEMPAKA KOTA BANJARBARU". Jurnal Rakat Sehat : Pengabdian Kepada Masyarakat 1, n.º 1 (22 de abril de 2022): 14–19. http://dx.doi.org/10.31964/jrs.v1i1.5.
Texto completo da fonteCoyne, John F., David King, Steven Garin e Allen Fred Fielding. "Detection of child abuse". British Journal of Oral and Maxillofacial Surgery 35, n.º 6 (dezembro de 1997): 448. http://dx.doi.org/10.1016/s0266-4356(97)90755-5.
Texto completo da fonteRohringer, Taryn J., Tony E. Rosen, Mihan R. Lee, Pallavi Sagar e Kieran J. Murphy. "Can diagnostic imaging help improve elder abuse detection?" British Journal of Radiology 93, n.º 1110 (junho de 2020): 20190632. http://dx.doi.org/10.1259/bjr.20190632.
Texto completo da fonteBahrami, Pouneh Nikkhah, Umar Iqbal e Zubair Shafiq. "FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting". Proceedings on Privacy Enhancing Technologies 2022, n.º 2 (3 de março de 2022): 557–77. http://dx.doi.org/10.2478/popets-2022-0056.
Texto completo da fonteXu, Shujuan, Biao Ma, Jiali Li, Wei Su, Tianran Xu e Mingzhou Zhang. "Europium Nanoparticles-Based Fluorescence Immunochromatographic Detection of Three Abused Drugs in Hair". Toxics 11, n.º 5 (29 de abril de 2023): 417. http://dx.doi.org/10.3390/toxics11050417.
Texto completo da fonteBrown, Sarah D., Greg Brack e Frances Y. Mullis. "Traumatic Symptoms in Sexually Abused Children: Implications for School Counselors". Professional School Counseling 11, n.º 6 (agosto de 2008): 2156759X0801100. http://dx.doi.org/10.1177/2156759x0801100603.
Texto completo da fonteS, Srividya M., Anala M. R e Chetan Tayal. "Deep learning techniques for physical abuse detection". IAES International Journal of Artificial Intelligence (IJ-AI) 10, n.º 4 (1 de dezembro de 2021): 971. http://dx.doi.org/10.11591/ijai.v10.i4.pp971-981.
Texto completo da fonteTeses / dissertações sobre o assunto "Abuse detection"
Abbott, R. W. "HPLC of drugs of abuse with chemiluminescence detection". Thesis, University of Hull, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.384671.
Texto completo da fonteLamping, Sarah Louise. "Study of SERS for the detection of drugs of abuse". Thesis, University of Strathclyde, 2008. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=21989.
Texto completo da fonteFaulds, Karen Jade. "Detection of drugs of abuse by surface enhanced Raman scattering (SERS)". Thesis, University of Strathclyde, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288636.
Texto completo da fonteBadiru, Shewu Oladapo. "Chromatographic studies on the detection of some basic drugs of abuse". Thesis, University of Bath, 1989. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.234086.
Texto completo da fonteMansell, Sheila L. "Sexual abuse detection, sequelae, and therapy accommodations for people with developmental disabilities". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/nq23027.pdf.
Texto completo da fonteWang, Ling. "Applications of Paper Microfluidic Systems in the Field Detection of Drugs of Abuse". FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3381.
Texto completo da fonteCécillon, Noé. "Combining Graph and Text to Model Conversations : An Application to Online Abuse Detection". Electronic Thesis or Diss., Avignon, 2024. http://www.theses.fr/2024AVIG0100.
Texto completo da fonteOnline abusive behaviors can have devastating consequences on individuals and communities. With the global expansion of internet and the social networks, anyone can be confronted with these behaviors. Over the past few years, laws and regulations have been established to regulate this kind of abuse but the responsibility ultimately lies with the platforms that host online communications. They are asked to monitor their users in order to prevent the proliferation of abusive content. Timely detection and moderation is a key factor to reduce the quantity and impact of abusive behaviors. However, due to the sheer quantity of online messages posted every day, platforms struggle to provide adequate resources. Since this implies high human and financial costs, companies have a keen interest in automating this process. Although it may seem a relatively simple task, it turns out to be quite complex. Indeed, malicious users have developed numerous techniques to bypass the standard automated methods. Allusions or implied meaning are other examples of strategies that automatic methods struggle to detect. While usually performed on individual messages taken out of their context, it has been shown that automatic abuse detection can benefit from considering the context in which the message was posted. In this thesis, we want to focus on the combination of content and structure of conversations to tackle the abuse detection task. Using the textual content of messages is the standard approach which was first developed in the literature. It has the advantage of being easy to set up, but on the other hand, it is vulnerable to text-based attacks such as obfuscation. The structure of the conversation which represent the context is less frequently used as it is more complicated to manipulate. Yet it allows to introduce a contextual aspect which helps detecting abuse occurrences when the text on its own is not sufficient. This context can be modeled as a contextual graph representing the conversation which includes the message. By comparing two methods based on feature engineering on a dataset of conversations extracted from a video games, we could show that a method relying exclusively on conversational graphs and ignoring the content was able to obtain better detection performance. The literature suggest that combining multiple modalities often result in a better detection of abusive messages. We propose multiple strategies to combine the content and structure of conversations and prove that their combination is indeed beneficial to the detection. A limitation of feature-based methods is that they are costly in time and computational resources. Our study also highlights that only a fraction of the computed features are truly relevant for the task. Representation learning methods can be used to mitigate these issues by automatically learning the representations of text and conversational graphs. For graphs, we demonstrated that using edge weights, signs and directions improved the performance. As no method exists for signed whole-graph embedding, we fill this gap in the literature by developing two such methods. We assess them on a newly constituted benchmark of three datasets of signed graphs and show that they perform better than their unsigned counterparts. Lastly, we perform a comparative study of several lexical and graph-embedding method for abuse detection by applying them to our dataset of conversations. Our results show that they perform better than feature-based approaches on text and are slightly less effective on graphs. Still, they obtain promising results given that they are completely task independent, much more scalable and time-efficient than feature-based approaches
Yang, Li. "A comparison of unsupervised learning techniques for detection of medical abuse in automobile claims". California State University, Long Beach, 2013.
Encontre o texto completo da fonteMwenesongole, Ellen Musili. "Simultaneous detection of drugs of abuse in waste water using gas chromatography-mass spectrometry". Thesis, Anglia Ruskin University, 2015. http://arro.anglia.ac.uk/550378/.
Texto completo da fonteLow, Ann Stewart. "An evaluation of analytical procedures for detection of drug abuse with particular reference to opiates". Thesis, Robert Gordon University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.242985.
Texto completo da fonteLivros sobre o assunto "Abuse detection"
Mwiti, Gladys. Child abuse: Detection, prevention, and counselling. Nairobi, Kenya: Evangel Pub. House, 2006.
Encontre o texto completo da fonteMedical Express. Professional Development Center., ed. The prevention and detection of elder abuse. San Diego, CA (12235 El Camino Real, Suite 200, San Diego 92130): MedicalExpress Professional Development Center, 2000.
Encontre o texto completo da fonteMedical Express. Professional Development Center., ed. The prevention and detection of elder abuse. San Diego, CA (12235 El Camino Real, Suite 200, San Diego 92130): MedicalExpress Professional Development Center, 2000.
Encontre o texto completo da fonteMedical Express. Professional Development Center., ed. The prevention and detection of elder abuse. San Diego, CA (12235 El Camino Real, Suite 200, San Diego 92130): MedicalExpress Professional Development Center, 2000.
Encontre o texto completo da fonteBonnie, Brandl, ed. Elder abuse detection and intervention: A collaborative approach. New York: Springer, 2007.
Encontre o texto completo da fonteOccult crime: Detection, investigation, and verification. Las Vegas, N.M: San Miguel Press, 1992.
Encontre o texto completo da fonteMiller, Gary J. Drugs and the law: Detection, recognition & investigation. [Altamonte Springs, FL]: Gould Publications, 1992.
Encontre o texto completo da fonteMiller, Gary J. Drugs and the law: Detection, recognition & investigation. Charlottesville, VA: LexisNexis, 2014.
Encontre o texto completo da fonteReno Conference on the Integration of Behavioral Health in Primary Care: Beyond Efficacy to Effectiveness. Early detection and treatment of substance abuse within integrated primary care. Reno, NV: Context Press, 2006.
Encontre o texto completo da fonteA, Burtonwood C., e Great Britain. Medicines and Healthcare products Regulatory Agency., eds. Sixteen devices for the detection of drugs of abuse in urine. London: MRHA, 2003.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Abuse detection"
Kumar, Ayush, Aryan Nigam, Aradhana Tripathi, Aftab Khan, Nigam Kumar Mishra e Rochak Bajpai. "Real-time-abuse detection model". In Advances in AI for Biomedical Instrumentation, Electronics and Computing, 595–99. London: CRC Press, 2024. http://dx.doi.org/10.1201/9781032644752-108.
Texto completo da fonteKong, Chao, Jianye Liu, Hao Li, Ying Liu, Haibei Zhu e Tao Liu. "Drug Abuse Detection via Broad Learning". In Web Information Systems and Applications, 499–505. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30952-7_49.
Texto completo da fonteChen, Yizheng, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Wenke Lee e Michael Farrell. "Financial Lower Bounds of Online Advertising Abuse". In Detection of Intrusions and Malware, and Vulnerability Assessment, 231–54. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40667-1_12.
Texto completo da fonteRao, Udai Pratap, e Nikhil Kumar Singh. "Detection of Privilege Abuse in RBAC Administered Database". In Studies in Computational Intelligence, 57–76. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-14654-6_4.
Texto completo da fonteSchänzer, Wilhelm. "Abuse of androgens and detection of illegal use". In Testosterone, 545–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/978-3-642-72185-4_20.
Texto completo da fontePapegnies, Etienne, Vincent Labatut, Richard Dufour e Georges Linarès. "Graph-Based Features for Automatic Online Abuse Detection". In Statistical Language and Speech Processing, 70–81. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68456-7_6.
Texto completo da fonteNelson, Anne E., e Ken K. Y. Ho. "Detection of Growth Hormone Doping in Sport Using Growth Hormone-Responsive Markers". In Hormone Use and Abuse by Athletes, 139–50. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7014-5_15.
Texto completo da fonteBelkowski, Stanley M., Jinmin Zhu, Lee Y. Liu-Chen, Toby K. Eisenstein, Martin W. Adler e Thomas J. Rogers. "Detection of К-Opioid Receptor mRNA in Immature T Cells". In The Brain Immune Axis and Substance Abuse, 11–16. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-1-4615-1951-5_2.
Texto completo da fontePapegnies, Etienne, Vincent Labatut, Richard Dufour e Georges Linarès. "Impact of Content Features for Automatic Online Abuse Detection". In Computational Linguistics and Intelligent Text Processing, 404–19. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77116-8_30.
Texto completo da fonteGarcía-Recuero, Álvaro, Jeffrey Burdges e Christian Grothoff. "Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks". In Data Privacy Management and Security Assurance, 78–93. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47072-6_6.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Abuse detection"
Sharon, Rini, Heet Shah, Debdoot Mukherjee e Vikram Gupta. "Multilingual and Multimodal Abuse Detection". In Interspeech 2022. ISCA: ISCA, 2022. http://dx.doi.org/10.21437/interspeech.2022-10629.
Texto completo da fonteWang, Andrew Z., Rex Ying, Pan Li, Nikhil Rao, Karthik Subbian e Jure Leskovec. "Bipartite Dynamic Representations for Abuse Detection". In KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3447548.3467141.
Texto completo da fonteFa, Zhou, Guang-Gang Geng, Zhi-Wei Yan e Xiao-Dong Lee. "A robust internet abuse detection method". In 2017 IEEE International Conference on Big Data (Big Data). IEEE, 2017. http://dx.doi.org/10.1109/bigdata.2017.8258113.
Texto completo da fonteWhiton, Adam, e Yolita Nugent. "A Wearable for Physical Abuse Detection". In 2007 11th IEEE International Symposium on Wearable Computers. IEEE, 2007. http://dx.doi.org/10.1109/iswc.2007.4373796.
Texto completo da fonteGupta, Vikram, Rini Sharon, Ramit Sawhney e Debdoot Mukherjee. "ADIMA: Abuse Detection In Multilingual Audio". In ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2022. http://dx.doi.org/10.1109/icassp43922.2022.9746718.
Texto completo da fonteMedvedeva, Marina. "AUTOMATIC DETECTION OF ABUSE ON SOCIAL MEDIA". In 16th International Multidisciplinary Scientific GeoConference SGEM2016. Stef92 Technology, 2016. http://dx.doi.org/10.5593/sgem2016/b21/s07.013.
Texto completo da fonteThakran, Yash, e Vinayak Abrol. "Investigating Acoustic Cues for Multilingual Abuse Detection". In INTERSPEECH 2023. ISCA: ISCA, 2023. http://dx.doi.org/10.21437/interspeech.2023-1311.
Texto completo da fontePalanikumar, Vasanth, Sean Benhur, Adeep Hande e Bharathi Raja Chakravarthi. "DE-ABUSE@TamilNLP-ACL 2022: Transliteration as Data Augmentation for Abuse Detection in Tamil". In Proceedings of the Second Workshop on Speech and Language Technologies for Dravidian Languages. Stroudsburg, PA, USA: Association for Computational Linguistics, 2022. http://dx.doi.org/10.18653/v1/2022.dravidianlangtech-1.5.
Texto completo da fonteMalte, Aditya, e Pratik Ratadiya. "Multilingual Cyber Abuse Detection using Advanced Transformer Architecture". In TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON). IEEE, 2019. http://dx.doi.org/10.1109/tencon.2019.8929493.
Texto completo da fonteFounta, Antigoni Maria, Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Athena Vakali e Ilias Leontiadis. "A Unified Deep Learning Architecture for Abuse Detection". In the 10th ACM Conference. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3292522.3326028.
Texto completo da fonteRelatórios de organizações sobre o assunto "Abuse detection"
Peter W. Carr, K.M. Fuller, D.R. Stoll, L.D. Steinkraus, M.S. Pasha e Glenn G. Hardin. Fast Gradient Elution Reversed-Phase HPLC with Diode-Array Detection as a High Throughput Screening Method for Drugs of Abuse. Office of Scientific and Technical Information (OSTI), dezembro de 2005. http://dx.doi.org/10.2172/892807.
Texto completo da fonteBecker, David, Daniel Kessler e Mark McClellan. Detecting Medicare Abuse. Cambridge, MA: National Bureau of Economic Research, agosto de 2004. http://dx.doi.org/10.3386/w10677.
Texto completo da fonteBotulinum Neurotoxin-Producing Clostridia, Working Group on. Report on Botulinum Neurotoxin-Producing Clostridia. Food Standards Agency, agosto de 2023. http://dx.doi.org/10.46756/sci.fsa.ozk974.
Texto completo da fonteSteinman, Dave, Mike Celiceo e Joe Head. Stopping Insider Abuse and Spying. Detecting the Hard Stuff: Stolen Passwords Unauthorized Records Browsing, Employee Espionage, Infiltration, and Insertion of Unwelcome Code, via Automatic Behavior Profiling. Fort Belvoir, VA: Defense Technical Information Center, junho de 1999. http://dx.doi.org/10.21236/ada385478.
Texto completo da fonte