2015
DOI: 10.1016/j.procs.2015.07.536
|View full text |Cite
|
Sign up to set email alerts
|

Logistic Models for Classifying Online Grooming Conversation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(31 citation statements)
references
References 3 publications
0
31
0
Order By: Relevance
“…We used the logistic regression algorithm to construct a classifier ( Zhang et al, 2014 ; Pranoto et al, 2015 ). Logistic regression uses the sigmoid function to represent the probability of a sample being labeled as a certain category, and prediction of tissue origin can be explained as a one-to-many classification problem.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We used the logistic regression algorithm to construct a classifier ( Zhang et al, 2014 ; Pranoto et al, 2015 ). Logistic regression uses the sigmoid function to represent the probability of a sample being labeled as a certain category, and prediction of tissue origin can be explained as a one-to-many classification problem.…”
Section: Methodsmentioning
confidence: 99%
“…The International Cancer Genome Consortium (ICGC), together with machine learning methods could improve the predictive performance. Here, the random forest algorithm ( Sandri and Zuccolotto, 2006 ) was selected as a gene selection algorithm, and the logistic regression algorithm ( Zhang et al, 2014 ; Pranoto et al, 2015 ) was utilized to establish a classifier. Performance evaluation was judged by metrics, such as accuracy and specificity.…”
Section: Introductionmentioning
confidence: 99%
“…In the scientific field, grooming has been conceptualized as a procedural technique, criminal activity, or operational concept used by cybernetic attackers, who in some cases have a disorder of sexual preference for children or adolescents. In the development of false friendship, the attacker applies strategies to determine affinities, tastes or activities of interest to the victim, thus developing a relationship of trust where the main objective is sexual desensitization, giving rise to the satisfaction of the needs of the attacker; as the sexual act [1], [2], [12]. As a computer attack technique, grooming can be applied for very long periods, in order to guarantee the cooperation of its victims and minimizing the risk of exposure.…”
Section: What Is Grooming?mentioning
confidence: 99%
“…Some authors, supported by previous research and psychological studies apply techniques of text mining and machine learning to determine the nature and different levels of danger of this attack [4], [7]- [9]. However, it has been shown that the results of the research related to the study of grooming, contemplate different lines of research, are not conclusive and support other relevant studies [6], [10]- [12].…”
Section: Introductionmentioning
confidence: 99%
“…The Support Vector Machine (SVM) was then adopted as the classifier to solve the text classification task, thus to raise an alarm when a grooming type activity in a conversation is detected [7]. A grooming detection system was proposed by establishing a logistic mathematical model based on some frequently appeared key characteristics to classify online conversation logs [8]. However, the uncertainty naturally included in the conversions may affect the efficiency of these approaches.…”
Section: Introductionmentioning
confidence: 99%