International dark web platforms operating within multiple geopolitical regions and languages host a myriad of hacker assets such as malware, hacking tools, hacking tutorials …
Anomalies (or outliers) indicate a minority of data items that are quite different from the majority (inliers) of a dataset in a certain aspect. Unsupervised anomaly detection (UAD) is …
BN Levine - University of Massachusetts Amherst, 2022 - read-me.org
Nothing in history has transformed the character and practice of child sexual exploitation more than the internet. Individuals who commit child sex crimes use internet services, social …
We consider the problem of finding anomalies in high-dimensional data using popular PCA based anomaly scores. The naive algorithms for computing these scores explicitly compute …
This is a quantitative-comparative analysis that focuses on Artificial Intelligence (AI) platforms that assist law enforcement agencies as they combat human trafficking. Human …
Cybercrime forums and marketplaces are used by members to share hacking techniques, general community-building discussions, and trade hacking tools. While there is a large …
This thesis explores various new questions around the role of memory in learning. These questions are motivated by the scale of modern machine learning models and datasets …
The aim of this study is to understand the Tor browser and its multiple applications as related to cybersecurity. The study also argues that most internet users are not aware of the danger …
Human trafficking is a form of modern-day slavery that, while highly illegal, is more dangerous with the advancements of modern technology (such as the Internet), which …