03.04.2014 Views

ora-schriften-s-2013

ora-schriften-s-2013

ora-schriften-s-2013

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Technical Approaches for the Detection of Criminal Activities in Online Environments<br />

References<br />

[1] M. A. Anusuya, S. K. Katti: „Speech<br />

Recognition by Machine, A Review”, Int.<br />

Journal of Computer Science and<br />

Information Security (IJCSIS) 06/03,<br />

Dezember 2009, S. 181-205.<br />

[2] C.M. Bishop: “Neural Networks for<br />

Pattern Recognition”, Oxford: Oxford<br />

University Press, 1995.<br />

[3] S. W. Brenner: “Is There Such a Thing<br />

as ‘Virtual Crime’?”, 4th California<br />

Criminal Law Review, 2001, pp. 105-11.<br />

[4] M. Brückner, C. Kanzow, T. Scheffer:<br />

„Static Prediction Games for Adversarial<br />

Learning Problems”, Journal of Machine<br />

Learning Research (JMLR), Vol. 13,<br />

2012, S. 2617-2654.<br />

[5] K.-K. R. Choo: “Online child grooming. A<br />

literature review on the misuse of social<br />

networking sites for grooming children for<br />

sexual offences”, Australian Institute of<br />

Criminology, 2009.<br />

[6] F. Collins, D. McCormick: “Digital Selves:<br />

Lessons from Second Life”, in Proc.<br />

World Conf. on Educational Multimedia,<br />

Hypermedia and Telecommunications<br />

(Ed-Media) 2011, S. 3405-3411,<br />

Chesapeake, VA, USA : AACE, 2011.<br />

[7] X. Deng, V. Haarslev, N. Shiri:<br />

“Measuring Inconsistencies in<br />

Ontologies”, in Proc. 4th Europ. Conf. on<br />

The Semantic Web: Research and<br />

Applications (ESWC ‘07), Berlin :<br />

Springer, 2007, S. 326-340.<br />

[8] Directive 2011/93/EU of the European<br />

Parliament and of the Council of 13<br />

December 2011 on combating the sexual<br />

abuse and sexual exploitation of children<br />

and child pornography, and replacing<br />

Council Framework Decision 2004/68/<br />

JHA. Official Journal of the European<br />

Union, L 335/1, 17.12.2011.<br />

[9] G. Ehrmann, U. Lucke, M. Mulder, T.-G.<br />

Rüdiger, T. Schulz-Spirohn, J. Storbeck,<br />

D. Woidke: “Protecting Children and<br />

Minors in the Internet: Perils of Cyber-<br />

Grooming in Virtual Worlds”, Position<br />

Paper, October 2012. http://apache.cs.<br />

uni-potsdam.de/de/profs/ifi/mm/<br />

positionpaper-CyberGrooming-EN.pdf<br />

[10] European Convention on Human<br />

Rights, ETS 5; 213 UNTS 221, Rome, 4<br />

November 1950.<br />

[11] M. Gelfond: «Answer sets», in:<br />

“Handbook of Knowledge<br />

Representation”, Elsevier, 2008, pp. 285-<br />

316.<br />

[12] A. Gupta, C. Forgy, A. Newell, and R.<br />

Wedig: “Parallel algorithms and<br />

architectures for rule-based systems”,<br />

SIGARCH Comput. Archit. News, Vol. 14,<br />

No. 2, May 1986, pp. 28-37.<br />

[13] S. Jacobsen, M. Mulder: „Dutch police,<br />

vision on youth and internet“, in this issue.<br />

[14] R. Koenen (Ed.): “Coding of Moving<br />

Pictures and Audio”, ISO/IEC JTC1/SC29/<br />

WG11, Moving Picture Experts Group,<br />

März 2002.<br />

[15] C. Krebs, T. Rüdiger: „Gamecrime und<br />

Metacrime: Strafrechtlich relevante<br />

Handlungen im Zusammenhang mit<br />

virtuellen Welten“, Verlag für<br />

Polizeiwissenschaft, Dezember 2010.<br />

[16] S. Livingstone, L. Haddon, A. Görzig,<br />

K. Ólafsson: „EU Kids Online“, Final<br />

Project Report, 2011.<br />

[17] M. Mohri, A. Rostamizadeh, A.<br />

Talwalkar: “Foundations of machine<br />

learning”, Cambridge, MA : MIT Press,<br />

2012.<br />

[18] T. Morris: “Computer Vision and Image<br />

Processing”, Palgrave Macmillan, 2004.<br />

[19] Andreas Pfitzmann: „Contra Online-<br />

Durchsuchung“, Informatik Spektrum<br />

31/01, Februar 2008, S. 65-69.<br />

[20] T.-G. Rüdiger: „Sexualtäter in virtuellen<br />

Welten“, in this issue.<br />

[21] N. Spirin, J. Han: “Survey on Web Spam<br />

Detection: Principles and Algorithms”, ACM<br />

Expl<strong>ora</strong>tions on Knowledge Discovery and<br />

Data Mining (KDD) 13/02, 2011, S. 50-64.<br />

[22] Jörg Ziercke: „Pro Online-<br />

Durchsuchung“, Informatik Spektrum<br />

31/01, Februar 2008, S. 62-64.<br />

Special Edition <strong>2013</strong><br />

81

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!