{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:06:35Z","timestamp":1729631195347,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/isi.2015.7165942","type":"proceedings-article","created":{"date-parts":[[2015,7,27]],"date-time":"2015-07-27T21:16:54Z","timestamp":1438031814000},"page":"73-78","source":"Crossref","is-referenced-by-count":1,"title":["LECENing places to hide: Geo-mapping child exploitation material"],"prefix":"10.1109","author":[{"given":"Bryan","family":"Monk","sequence":"first","affiliation":[]},{"given":"Russell","family":"Allsup","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Frank","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2004.1401289"},{"key":"ref11","first-page":"103","author":"forsyth","year":"1996","journal-title":"Identifying nude pictures In Applications of Computer Vision"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI.2009.32"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2003.1238663"},{"key":"ref14","first-page":"1552","article-title":"A bag-of-features approach based on hue-SIFT descriptor for nude detection","author":"lopes","year":"2009","journal-title":"Proceedings of the 17th European Signal Processing Conference"},{"key":"ref15","first-page":"1","article-title":"Bag-of-visual-words models for adult image classification and filtering","author":"deselaers","year":"2008","journal-title":"Pattern Recognition 2008 ICPR 2008 19th International Conference on"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2202\/1944-2866.1126"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.25"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1938606.1938609"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.55"},{"key":"ref4","first-page":"60","article-title":"Internet child pornography: International responses","author":"jewkes","year":"2007","journal-title":"Crime Online"},{"journal-title":"Child Pornography on the Internet","year":"2006","author":"wortley","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/j.chiabu.2013.10.018","article-title":"Measuring a year of child pornography trafficking by us computers on a peer-to-peer network","volume":"38","author":"wolak","year":"2014","journal-title":"Child Abuse & Neglect"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-407817-8.00001-1"},{"journal-title":"Protecting our Children","year":"2011","key":"ref8"},{"journal-title":"Crimes against Children","year":"2014","key":"ref7"},{"key":"ref2","first-page":"1","article-title":"Child abuse and the internet","volume":"15","author":"stanley","year":"2001","journal-title":"Chil Abu Prev"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2011.32"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/S0219467806002082"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/19331680802425503"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1971162.1971171"},{"year":"2014","author":"geolite","key":"ref21"}],"event":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2015,5,27]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2015,5,29]]}},"container-title":["2015 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7153595\/7165923\/07165942.pdf?arnumber=7165942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:29:47Z","timestamp":1498235387000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7165942\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isi.2015.7165942","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}