The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for abuse with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-1987 (15) 1988-1993 (15) 1994-1998 (16) 1999-2000 (20) 2001 (15) 2002 (16) 2003-2004 (47) 2005 (34) 2006 (44) 2007 (44) 2008 (38) 2009 (34) 2010 (29) 2011 (51) 2012 (22) 2013 (24) 2014 (21) 2015 (33) 2016 (41) 2017 (53) 2018 (61) 2019 (75) 2020 (90) 2021 (80) 2022 (68) 2023 (54) 2024 (26)
Publication types (Num. hits)
article(420) incollection(3) inproceedings(623) phdthesis(18) proceedings(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 344 occurrences of 275 keywords

Results
Found 1066 publication records. Showing 1066 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
91Antonella De Angeli, Sheryl Brahnam, Peter Wallis 0001, Alan J. Dix Misuse and abuse of interactive technologies. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2006 DBLP  DOI  BibTeX  RDF abuse, disinhibition, machine violence, mediated verbal abuse, user aggression
84Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie Abuse-Free Optimistic Contract Signing. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
82Chen-Huei Chou, Atish P. Sinha, Huimin Zhao 0003 A text mining approach to Internet abuse detection. Search on Bibsonomy Inf. Syst. E Bus. Manag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Internet abuse, Internet filtering, Text mining, Text categorization
72Yvo Desmedt Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
70Yubao Liu, Jiarong Cai, Zhilan Huang, Jingwen Yu, Jian Yin 0001 Fast detection of database system abuse behaviors based on data mining approach. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access profiles, anomaly-based detection model, data system abuse behaviors, maximal access profiles, FP-tree
59Per Arne Godejord Exploring teacher methodology: using the example of sexual abuse of children as a way of teaching social informatics. Search on Bibsonomy ITiCSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sexual abuse, teacher methodology, project, teaching method, social informatics
49Kai Fan 0001, Yue Wang 0043, Hui Li 0006 A New Abuse-Free Fair Electronic Payment Protocol. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Jarad Niemi, Meredith Smith, David Banks Test Power for Drug Abuse Surveillance. Search on Bibsonomy BioSecure The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49Steve Kremer, Jean-François Raskin Game Analysis of Abuse-free Contract Signing. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
49Vitaly Shmatikov, John C. Mitchell Analysis of Abuse-Free Contract Signing. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
49Donn B. Parker Computer abuse perpetrators and vulnerabilities of computer systems. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1976 DBLP  DOI  BibTeX  RDF
47Peter O'Connor An Analysis of Hotel Trademark Abuse in Pay-Per-Click Search Advertising. Search on Bibsonomy ENTER The full citation details ... 2007 DBLP  DOI  BibTeX  RDF trademark abuse, Search engine marketing, hotel sector
46Johan Peeters, Paul Dyson Cost-Effective Security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Suranjan Pramanik, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya Security Policies to Mitigate Insider Threat in the Document Control Domain. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
44Henry S. Baird, Kris Popat Human Interactive Proofs and Document Image Analysis. Search on Bibsonomy Document Analysis Systems The full citation details ... 2002 DBLP  DOI  BibTeX  RDF abuse of web sites and services, the chatroom problem, human/machine discrimination, OCR performance evaluation, legibility of text, document image analysis, CAPTCHAs, Turing tests, Human interactive proofs, document image degradations
44Adam L. Young, Moti Yung The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log
42David Dittrich, Michael D. Bailey, Sven Dietrich Building an Active Computer Security Ethics Community. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF NONE, K.4.1.a Abuse and crime involving computers, K.4.1.c Ethics, K.4.1.g Regulation, K.4.2.a Abuse and crime involving computers, K.7.4.a Codes of ethics, K.7.4.c Ethical dilemmas, K.7.m.b Ethics
42J. D. Falk, Murray S. Kucherawy Battling Spam: The Evolution of Mail Feedback Loops. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF mail feedback loops, mail abuse reporting format, MARF, complaint feedback loops, abuse reporting format, ARF, email standards, MAAWG, spam, email, Phishing, IETF
38Jeffrey J. Johnson, Kenneth W. Chalmers Identifying Employee Internet Abuse. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Detlef Kähler, Ralf Küsters, Thomas Wilke A Dolev-Yao-Based Definition of Abuse-Free Protocols. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Anat Talmy, Oren Dobzinski Abuse Freedom in Access Control Schemes. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Guilin Wang An abuse-free fair contract signing protocol based on the RSA signature. Search on Bibsonomy WWW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, e-commerce, digital signatures, RSA, cryptographic protocols, fair-exchange, contract signing
38Hao Wang 0003, Heqing Guo, Jianfei Yin, Qi He 0002, Manshan Lin, Jun Zhang 0005 Abuse-Free Item Exchange. Search on Bibsonomy ICCSA (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Vinod Yegneswaran, Paul Barford, David Plonka On the Design and Use of Internet Sinks for Network Abuse Monitoring. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Deception Systems, Intrusion Detection, Honeypots
38Stanislaw Jarecki, Vitaly Shmatikov Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Luncheng Lin, Bashar Nuseibeh, Darrel C. Ince, Michael Jackson 0001, Jonathan D. Moffett Introducing Abuse Frames for Analysing Security Requirements. Search on Bibsonomy RE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
38John P. McDermott Abuse-Case-Based Assurance Arguments. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
38Birgit Baum-Waidner, Michael Waidner Round-Optimal and Abuse Free Optimistic Multi-party Contract Signing. Search on Bibsonomy ICALP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
38Juan A. Garay, Philip D. MacKenzie Abuse-Free Multi-party Contract Signing. Search on Bibsonomy DISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF digital signatures, Cryptographic protocols, fair exchange, contract signing
38Ivan Damgård Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
36Christopher Kunz, Jan Wiebelitz, Stefan Piger, Christian Grimm A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection. Search on Bibsonomy ISPDC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF abuse detection, Grid, PKI, auditing, X.509, proxy certificate
36Paco Hope, Gary McGraw, Annie I. Antón Misuse and Abuse Cases: Getting Past the Positive. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF abuse cases, software development, software design, misuse cases
34Wayne Liu, Sudhir Aggarwal, Zhenhai Duan Incorporating accountability into internet email. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF email misuse, trust management, accountability
34Danny Hughes 0001, Paul Rayson, James Walkerdine, Kevin Lee, Phil Greenwood, Awais Rashid, Corinne May-Chahal, Margaret Brennan Supporting Law Enforcement in Digital Communities through Natural Language Analysis. Search on Bibsonomy IWCF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Child Protection, Social Networks, P2P, Network Monitoring, Natural Language Analysis
32Kshitij Gupta, Adwait Joshi, Jamie Allison McAtee, Nigel Savio Vaz aSister: scheduling for homeless women with special needs. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2008 DBLP  DOI  BibTeX  RDF pregnancy, substance abuse, scheduling, text messaging, homelessness
32Christian M. Jones Online games-based child safety environment. Search on Bibsonomy IE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anti-abduction, child safety, sexual abuse prevention, social and psychological evaluation, animation, games-based learning
32Adam L. Young, Moti Yung Towards Signature-Only Signature Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST
31Katie Winkle, Natasha Mulvihill Anticipating the Use of Robots in Domestic Abuse: A Typology of Robot Facilitated Abuse to Support Risk Assessment and Mitigation in Human-Robot Interaction. Search on Bibsonomy HRI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
31Sophie Stephenson, Majed Almansoori, Pardis Emami Naeini, Danny Yuxing Huang, Rahul Chatterjee 0001 Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
31Min-Wei Hung, Tina Chien-Wen Yuan, Nanyi Bi, Yi-Chao Chen 0001, Wan-Chen Lee, Ming-Chyi Huang, Chuang-Wen You To Use or Abuse: Opportunities and Difficulties in the Use of Multi-channel Support to Reduce Technology Abuse by Adolescents. Search on Bibsonomy Proc. ACM Hum. Comput. Interact. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
31Roxanne Leitão Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums. Search on Bibsonomy Hum. Comput. Interact. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
31Graham G. Scott, Zara P. Brodie, Megan J. Wilson, Lucy Ivory, Christopher J. Hand, Sara C. Sereno Celebrity abuse on Twitter: The impact of tweet valence, volume of abuse, and dark triad personality factors on victim blaming and perceptions of severity. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Isar Nejadgholi, Svetlana Kiritchenko On Cross-Dataset Generalization in Automatic Detection of Online Abuse. Search on Bibsonomy WOAH The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Vinodkumar Prabhakaran, Zeerak Waseem, Seyi Akiwowo, Bertie Vidgen Online Abuse and Human Rights: WOAH Satellite Session at RightsCon 2020. Search on Bibsonomy WOAH The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Pushkar Mishra, Helen Yannakoudakis, Ekaterina Shutova Tackling Online Abuse: A Survey of Automated Abuse Detection Methods. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
31Sudha Subramani, Hua Wang 0002, Md. Rafiqul Islam 0004, Anwaar Ulhaq, Manjula O'Connor Child Abuse and Domestic Abuse: Content and Feature Analysis from Social Media Disclosures. Search on Bibsonomy ADC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Gökçe Nur Say, Zehra Babadagi, Koray Karabekiroglu, Murat Yüce, Seher Akbas Abuse Characteristics and Psychiatric Consequences Associated with Online Sexual Abuse. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Luncheng Lin, Bashar Nuseibeh, Darrel C. Ince, Michael Jackson 0001 Using Abuse Frames to Bound the Scope of Security Problems. Search on Bibsonomy RE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuji Yamaoka Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27John P. McDermott, Chris Fox Using Abuse Case Models for Security Requirements Analysis. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF security, UML, requirements, use case
23Qiang He 0001, Jun Yan 0005, Hai Jin 0001, Yun Yang 0001 ServiceTrust: Supporting Reputation-Oriented Service Selection. Search on Bibsonomy ICSOC/ServiceWave The full citation details ... 2009 DBLP  DOI  BibTeX  RDF service reputation, Web services, trust, Service-oriented computing, service selection
23Markus Rückert, Dominique Schröder Security of Verifiably Encrypted Signatures and a Construction without Random Oracles. Search on Bibsonomy Pairing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Joonseong Ko, Kanghak Kim, Ohyeon Kweon, Jongwook Kim, Young-rin Kim, Steve SangKi Han Open Editing Algorithm: A Collaborative News Promotion Algorithm Based on Users' Voting History. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Yongdong Wu, Feng Bao 0001, Robert H. Deng, Marc Mouffron, Frederic Rousseau 0002 Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Kent Chan, Edgar Rodriguez, John L. Kundert-Gibbs, Adam Blank, James Orara, Tim Steele, Jeremy Hicks, Will Robinson, Rupali Parekh Mileena Malign. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Dave DeBarr 0001, Zachary Eyler-Walker Closing the gap: automated screening of tax returns to identify egregious tax shelters. Search on Bibsonomy SIGKDD Explor. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF abusive tax shelter, data mining, support vector machine, link analysis
23Luis von Ahn, Andrew Bortz, Nicholas J. Hopper, Kevin O'Neill Selectively Traceable Anonymity. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Wenqi Liu, Jianhua Yang, Lei Wei A Secure Threshold Proxy Signature Scheme for Mobile Agent-Based Electronic Commerce Transactions. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Daniel E. Geer Jr. When Is a Product a Security Product? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security products
23Martín Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber Moderately hard, memory-bound functions. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Spam
23Boguslaw Banaszak, Katarzyna Rodziewicz Trust and Security. Digital Citizen Cards in Poland. Search on Bibsonomy EGOV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Kim Todd, Jon Rickman, Tabatha Verbick Implementing a network improvement action plan. Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF communication, network management, customer service, network stability
23Robert Willison Understanding the Offender/Environment Dynamic for Computer Crimes: Assessing the Feasibility of Applying Criminological Theory to the IS Security Context. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. Memon Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Bertis B. Little, Walter L. Johnston, Ashley C. Lovell, Roderick M. Rejesus, Steve A. Steed Collusion in the U.S. crop insurance program: applied data mining. Search on Bibsonomy KDD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF doublets, insurance fraud, non-recursive, triplets, collusion, log linear models
23Kim Todd, Tabatha Verbick, Merlin Miller Policies for the digital age campus. Search on Bibsonomy SIGUCCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF privacy, information technology, policies, computing, e-mail
23Frank R. Funderburk, Karen I. Bolla, Jean-Lud Cadet Multilayer Perceptrons Can Predict Cognitive Status during Recovery from Chronic Substance Misuse: Implications for Individualized Treatment Planning. Search on Bibsonomy IJCNN (3) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
23Tatsuaki Okamoto, Kazuo Ohta Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
23Yvo Desmedt Abuses in Cryptography and How to Fight Them. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
23Louise Giovane Becker A national perspective on computer security. Search on Bibsonomy ACM Annual Conference The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
21Soon Hin Khor, Akihiro Nakao DaaS: DDoS Mitigation-as-a-Service. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF resource abuse, distributed system, network security, Denial-of-service
21Xiangdong Li, Qiusheng Zheng Two-round Multi-Party Contract Signing. Search on Bibsonomy WKDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF multi-party contract signing, abuse-freeness, formal analysis, fair exchange, strand space
21Ilkka Uusitalo, Josep M. Catot, Ramon Loureiro Phishing and Countermeasures in Spanish Online Banking. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Abuse and crime involving computers, Security, Authentication, Electronic commerce, Invasive software
21Kevin Borders, Xin Zhao 0016, Atul Prakash 0001 Securing sensitive content in a view-only file system. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2006 DBLP  DOI  BibTeX  RDF insider abuse, virtual machines, file systems, digital rights management, information leakage
21Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta A new fair non-repudiation protocol for secure negotiation and contract signing. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF abuse freeness, contract negotiation, contract signing protocol, security, e-commerce, confidentiality, fair-exchange
21William Pohlhaus Ethical engagement with data collection efforts related to fighting terrorists and terrorism in the context of recent events. Search on Bibsonomy ITiCSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF accountability and abuse, privacy, computer ethics
21Henry S. Baird, Michael A. Moll, Sui-Yu Wang ScatterType: A Legible but Hard-to-Segment CAPTCHA. Search on Bibsonomy ICDAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF abuse of web sites and services, human/machine discrimination, legibility of text, Gestalt perception, automatic attacks on CAPTCHAs, segmentation, fragmentation, document image analysis, CAPTCHAs, Turing tests, human interactive proofs
21Virginia Franke Kleist A Transaction Cost Model of Electronic Trust: Transactional Return, Incentives for Network Security and Optimal Risk in the Digital Economy. Search on Bibsonomy Electron. Commer. Res. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF transaction cost economics (AM02), electronic markets (HA0702), data security (EK01), authentication (EK05), data integrity (AD0514), abuse and crime (BB0103)
21Denis Verdon, Gary McGraw Risk Analysis in Software Design. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF abuse cases, software development, software design, misuse cases
21Elizabeth A. Evans, Carolyn M. Kotlas, Donna W. Bailey, Abe Crystal, Terri Buckner It's eleven o'clock: do you know where your identity is? Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF identity abuse, identity theft
21Do Van Thanh 0001 Security Issues in Mobile eCommerce. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF mobile e-commerce, mobile electronic commerce, illegal abuse, Ericsson, Web e-commerce, Internet, mobile phone, electronic commerce, data security, Wireless Application Protocol, mobile user
21Celia T. Romm, Nava Pliskin Electronic Mail as a Coalition-Building Information Technology. Search on Bibsonomy ACM Trans. Inf. Syst. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF abuse, coalition building, email, politics, MIS
15Mirko Franco, Ombretta Gaggi, Claudio Enrico Palazzi Can Messaging Applications Prevent Sexting Abuse? a Technology Analysis. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Jonathan Cui, David A. Araujo Rethinking use-restricted open-source licenses for regulating abuse of generative models. Search on Bibsonomy Big Data Soc. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Yanmei Cao, Jianghong Wei, Yang Xiang 0001, Willy Susilo, Xiaofeng Chen 0001 Abuse-resistant deniable encryption. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Sadia Tasnuva Pritha, Rahnuma Tasnim, Muhammad Ashad Kabir, Sumaiya Amin, Anik Das Smartphone apps for child sexual abuse education: gaps and design considerations. Search on Bibsonomy Int. J. Mob. Learn. Organisation The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Pedro H. V. Valois, João Macedo, Leo S. F. Ribeiro, Jefersson A. dos Santos, Sandra Avila Leveraging Self-Supervised Learning for Scene Recognition in Child Sexual Abuse Imagery. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Arkaprabha Bhattacharya, Kevin Lee, Vineeth Ravi, Jessica Staddon, Rosanna Bellini Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer Complaints. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Rahime Belen Saglam, Jason R. C. Nurse, Lisa Sugiura Designing Chatbots to Support Victims and Survivors of Domestic Abuse. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Jens Frieß, Tobias Gattermayer, Nethanel Gelernter, Haya Schulmann, Michael Waidner Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Ashfak Md Shibli, Mir Mehedi A. Pritom, Maanak Gupta AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Lucy Qin, Vaughn Hamilton, Sharon Wang, Yigit Aydinalp, Marin Scarlett, Elissa M. Redmiles "Did They Consent to That?": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Christoph Tillmann, Aashka Trivedi, Bishwaranjan Bhattacharjee Efficient Models for the Detection of Hate, Abuse and Profanity. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Hongzhan Lin, Ziyang Luo, Bo Wang, Ruichao Yang, Jing Ma 0004 GOAT-Bench: Safety Insights to Large Multimodal Models through Meme-Based Social Abuse. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Aatman Vaidya, Arnav Arora, Aditya Joshi, Tarunima Prabhakar Overview of the 2023 ICON Shared Task on Gendered Abuse Detection in Indic Languages. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Jian Zhu, Yuping Ruan, Jingfei Chang, Cheng Luo Deep Prompt Multi-task Network for Abuse Language Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Alexander Hoover, Ruth Ng, Daren Khu, Yao'an Li, Joelle Lim, Derrick Ng, Jed Lim, Yiyang Song Leakage-Abuse Attacks Against Structured Encryption for SQL. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
15Graham Kendall, Jaime A. Teixeira da Silva Risks of abuse of large language models, like ChatGPT, in scientific publishing: Authorship, predatory publishing, and paper mills. Search on Bibsonomy Learn. Publ. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Neetu Singh, Upkar Varshney Smart Interventions for Opioid Abuse: Design and Evaluation. Search on Bibsonomy Int. J. Heal. Inf. Syst. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Wenjian Luo, Licai Zhang, Yulin Wu, Chuanyi Liu, Peiyi Han, Rongfei Zhuang Capacity Abuse Attack of Deep Learning Models Without Need of Label Encodings. Search on Bibsonomy IEEE Trans. Artif. Intell. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1066 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license