The Many Kinds of Creepware Used for Interpersonal Attacks

The Many Kinds of Creepware Used for Interpersonal Attacks

IEEE Symposium on Security and Privacy via YouTube Direct link

How Does Technology Enable Intimate Partner Violence?

3 of 15

3 of 15

How Does Technology Enable Intimate Partner Violence?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Many Kinds of Creepware Used for Interpersonal Attacks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Intimate Partner Violence is Pervasive
  3. 3 How Does Technology Enable Intimate Partner Violence?
  4. 4 Discovering the mobile apps that enable abuse
  5. 5 Goals and Outline
  6. 6 Background
  7. 7 Datasets and Representation
  8. 8 CreepRank Overview
  9. 9 Adding FP Prevention with Prior Belief
  10. 10 Comparison to Random Walk with Restart
  11. 11 CreepRank False Positives
  12. 12 Spoofing Creepware
  13. 13 Harassment Creepware
  14. 14 Control Creepware
  15. 15 Ongoing Research Questions and Open Problems

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.