Peer-Reviewed Conference Proceedings

  • Westlake, B. G., Bouchard, M., & Frank, R. (2012, September 13). Comparing methods for detecting child exploitation content online. 2012 European Intelligence and Security Informatics Conference. Odense, Denmark, 22-24 August (pp 156-163). IEEE. doi: 10.1109/EISIC.2012.25.
  • Joffres, K., Bouchard, M., Frank, R., & Westlake, B. G. (2011, October 27). Strategies to disrupt online child pornography networks. 2011 European Intelligence and Security Informatics Conference. Athens, Greece, 12-14 September (pp. 163-170). IEEE. doi: 10.1109/EISIC.2011.32.
  • Frank, R., Westlake, B. G., & Bouchard, M. (2010, August). The structure and content of online child exploitation. ISI-KDD ’10 ACM SIGKDD Workshop on Intelligence and Security Informatics, Washington, USA, 25-28 July (Article 3). New York, USA: ACM. doi
    10.1145/1938606.1938609.