International audience; Peer-to-peer (P2P) systems are widely used to exchange content over the Internet. Knowledge of pedophile activity in such networks remains limited, despite having important social consequences. Moreover, though there are different P2P systems in ... View more
1. European Commission. “Safer Internet Programme: Empowering and Protecting Children Online.” 2010. Available online: http://ec.europa.eu/information_society/activities/sip/ index_en.htm (accessed on 4 June 2014).
2. Declan McCullagh. “RIAA: Child porn rife on P2P networks.” CNet, 9 September 2003. Available online: http://news.cnet.com/RIAA-Child-porn-rife-on-P2P-networks/ 2100-1028_3-5073817.html (accessed on 4 June 2014).
3. Daniel Hughes, James Walkerdine, Geoff Coulson, and Stephen Gibson. “Peer-to-Peer: Is Deviant Behavior the Norm on P2P File-Sharing Networks?” IEEE Distributed Systems Online 7 (2006): 1-11.
4. Matthieu Latapy, Clémence Magnien, and Raphaël Fournier. “Quantifying paedophile activity in a large P2P system.” Information Processing & Management 49 (2013): 248-63.
5. Sandvine Network. “Global Internet Phenomena Report: Spring 2011.” 2012. Available online: http://fr.scribd.com/doc/94722096/Sandvine-Global-Internet-Phenomena-Report-1H-2012 (accessed on 4 June 2014).
6. Munish Chopra, Miguel Vargas Martin, Luis Rueda, and Patrick C. K. Hung. “Toward New Paradigms to Combating Internet Child Pornography.” Paper Presented at Canadian Conference on Electrical and Computer Engineering (CCECE), Ottawa, ON, Canada. IEEE, 7-10 May 2006, pp. 1012-15.
7. Asaf Shupo, Miguel Vargas Martin, Luis Rueda, Anasuya Bulkan, Yongming Chen, and Patrick C.K. Hung. “Toward efficient detection of child pornography in the network infrastructure.” IADIS International Journal on Computer Science and Information Systems 1 (2006): 15-31.
8. Alexander Panchenko, Richard Beaufort, Hubert Naets, and Cedrick Fairon. “Towards Detection of Child Sexual Abuse Media: Categorization of the Associated Filenames.” In Advances in Information Retrieval. Edited by Pavel Serdyukov, Pavel Braslavski, Sergei O. Kuznetsov, Jaap Kamps, Stefan Rüger, Eugene Agichtein, Ilya Segalovich and Emine Yilmaz. Lecture Notes in Computer Science. Springer: Berlin Heidelberg, Germany, 2013, vol. 7814, pp. 776-79.
9. April Kontostathis, Andy Garron, Kelly Reynolds, Will West, and Lynne Edwards. “Identifying Predators Using ChatCoder 2.0.” Paper Presented at CLEF Conference 2012 Evaluation Labs and Workshop, Rome, Italy, 17-20 September, 2012. Edited by Pamela Forner, Jussi Karlgren and Christa Womser-Hacker.
10. Nick Pendar. “Toward Spotting the Pedophile Telling Victim from Predator in Text Chats.” Paper Presented at International Conference on Semantic Computing, Irvine, CA, USA, 17-19 September 2007, pp. 235-41.