Author:
Charalambous Elisavet,Kavallieros Dimitrios,Brewster Ben,Leventakis George,Koutras Nikolaos,Papalexandratos George
Publisher
Springer International Publishing
Reference25 articles.
1. Allsup R, Thomas E, Monk B, Frank R, Bouchard M (2015) Networking in child exploitation: assessing disruption strategies using registrant information. In: Proceedings of the 2015 IEEE/ACM international conference on advances in social networks analysis and mining 2015, ACM, pp. 400–407
2. Arthur KK, Venter HS (2004) An investigation into computer forensic tools. In: ISSA, pp. 1–11
3. Brewster B, Andrews S, Polovina S, Hirsch L, Akhgar B (2014) Environmental scanning and knowledge representation for the detection of organised crime threats. In: International conference on conceptual structures. Springer International Publishing, pp. 275–280
4. Carr J (2011) The internet dimension of sexual violence against children. In: Council of Europe, protecting children from sexual violence-A comprehensive approach, pp. 281–282
5. European Commission (2015) The European agenda on security. Retrieved from
http://ec.europa.eu/dgs/home-affairs/e-library/documents/basic-documents/docs/eu_agenda_on_security_en.pdf
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献