


ENCASE 8 DOWNLOAD FREE SOFTWARE
Software for: “It is just a flu: Assessing the Effect of Watch History on YouTube’s Pseudoscientific Video Recommendations” (not funded by ENCASE).Software for “Disturbed YouTube For Kids: Characterizing And Detecting Inappropriate Videos Targeting Young Children”.Crowdflower platform for “Large Scale Crowdsourcing and Characterization of Twitter Abusive Behavior”.Software for “On the Origins of Memes by Means of Fringe Web Communities”.Software for “Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls”.Software for “The Good, the Bad and the Bait: Detecting and Characterizing Clickbait on YouTube”.VCS password: case you face any problems accessing our git repositories, please do not hesitate to contact us.

You can clone the repository to create a local copy on your computer using the command The database of the ENCASE Back-End and Intelligent Web-Proxy Data Access Layer
ENCASE 8 DOWNLOAD FREE CODE
The source code of the Intelligent Web-Proxy The source code of the Online Social Networks Data Analytics Software Stack Environment (Back-End) The source code of the ENCASE browser add on Source code created under WP4, WP5, WP6, and WP7 At the same time, ENCASE’s approach respects the privacy of adolescents and acts as a parental advice (rather than control) tool with a focus on encouraging discreet supervision.ĮNCASE Open Repositories Repository description Its Machine-Learning-based classifiers are constantly updated via new data and feedback from users so they can remain effective as threats evolve. The ENCASE system augments the key capabilities of state-of-the-art parental control tools to tackle a broader spectrum of cybersafety challenges. It has also successfully delivered and is currently piloting the integrated software system. The consortium successfully disseminated and communicated its results, as evident by the numerous publications in top tier venues and the extensive international press coverage it has received.
ENCASE 8 DOWNLOAD FREE INSTALL
The main purpose of the back-end is to generate and install classifiers in the Web-proxy for the detection of:Ĭ) sensitive pictures/data posted by the minor Last, the third component is the OSN data analytics software stack (back-end). The second component is the Intelligent Web-proxy which captures and analyzes all the user’s incoming and outgoing OSN traffic to block or protect traffic when malicious activity or sensitive content is detected. The first component of the ENCASE architecture is a browser extension responsible for notifying the user of imminent threats. ENCASE has implemented an intelligent Cybersafety Family Advice Suite for the protection of minors on online social networks.ĮNCASE aims at leveraging the latest advances in usable security and privacy in order to design and implement a user-centric architecture for the protection of minors from malicious actors in Online Social Networks (OSN).
