N. C. D. Silva, F. A. Braz, T. D. Campos, A. Guedes, Danilo Barros Mendes, D. Bezerra, D. B. Gusmao, Felipe Borges S. Chaves, Gabriel G. Ziegler, L. Horinouchi, Marcelo U. Ferreira, P. H. Inazawa, V. Coelho, Ricardo V. C. Fernandes, Fabiano Peixoto, Mamede Said Maia Filho, Bernardo Pablo Sukiennik, Lahis Rosa, Roberta Paula Medeiros Silva, Tainá Aguiar Junquilho, G. Carvalho
The Brazilian Court System is currently the biggest judiciary system in the world, and receives an extremely high number of lawsuit cases every day. These cases need to be analyzed in order to be associated to relevant tags and allocated to the right team. Most of the cases reach the court as single PDF files containing multiple documents. One of the first steps for the analysis is to classify these documents. In this paper we present results on identifying these pieces of document using a simple convolutional neural network.
{"title":"Document type classification for Brazil’s supreme court using a Convolutional Neural Network","authors":"N. C. D. Silva, F. A. Braz, T. D. Campos, A. Guedes, Danilo Barros Mendes, D. Bezerra, D. B. Gusmao, Felipe Borges S. Chaves, Gabriel G. Ziegler, L. Horinouchi, Marcelo U. Ferreira, P. H. Inazawa, V. Coelho, Ricardo V. C. Fernandes, Fabiano Peixoto, Mamede Said Maia Filho, Bernardo Pablo Sukiennik, Lahis Rosa, Roberta Paula Medeiros Silva, Tainá Aguiar Junquilho, G. Carvalho","doi":"10.5769/c2018001","DOIUrl":"https://doi.org/10.5769/c2018001","url":null,"abstract":"The Brazilian Court System is currently the biggest judiciary system in the world, and receives an extremely high number of lawsuit cases every day. These cases need to be analyzed in order to be associated to relevant tags and allocated to the right team. Most of the cases reach the court as single PDF files containing multiple documents. One of the first steps for the analysis is to classify these documents. In this paper we present results on identifying these pieces of document using a simple convolutional neural network.","PeriodicalId":275250,"journal":{"name":"Proceedings of The Tenth International Conference on Forensic Computer Science and Cyber Law","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128049973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Paulo Quintiliano, Quintiliano Sociedade de Advocacia, Coriolano Camargo, A. Reyes
{"title":"Brasil como principal alvo de ataques cibernéticos","authors":"Paulo Quintiliano, Quintiliano Sociedade de Advocacia, Coriolano Camargo, A. Reyes","doi":"10.5769/c2018012","DOIUrl":"https://doi.org/10.5769/c2018012","url":null,"abstract":"","PeriodicalId":275250,"journal":{"name":"Proceedings of The Tenth International Conference on Forensic Computer Science and Cyber Law","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132441102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Uma análise forense do Sistema de Registro Eletrônico de Ponto","authors":"A. Ruschel","doi":"10.5769/C2018004","DOIUrl":"https://doi.org/10.5769/C2018004","url":null,"abstract":"","PeriodicalId":275250,"journal":{"name":"Proceedings of The Tenth International Conference on Forensic Computer Science and Cyber Law","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127244208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arquivos de áudio: exames via análise hexadecimal","authors":"Clauderson Biali","doi":"10.5769/C2018010","DOIUrl":"https://doi.org/10.5769/C2018010","url":null,"abstract":"","PeriodicalId":275250,"journal":{"name":"Proceedings of The Tenth International Conference on Forensic Computer Science and Cyber Law","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127756249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Batista, Faculdade Una de Betim, G. Silva, Vanessa Araújo, Vinicius da Silva Araújo, Thiago Silva Rezende, Augusto Junio Guimarães, Paulo Vitor de Campos Souza
{"title":"Utilização de Redes Neurais Nebulosas para criação de um Sistema Especialista em Invasões Cibernéticas","authors":"L. Batista, Faculdade Una de Betim, G. Silva, Vanessa Araújo, Vinicius da Silva Araújo, Thiago Silva Rezende, Augusto Junio Guimarães, Paulo Vitor de Campos Souza","doi":"10.5769/C2018002","DOIUrl":"https://doi.org/10.5769/C2018002","url":null,"abstract":"","PeriodicalId":275250,"journal":{"name":"Proceedings of The Tenth International Conference on Forensic Computer Science and Cyber Law","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124326436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"O uso da infraestrutura Blockchain na realização de negócios jurídicos","authors":"J. Milagre","doi":"10.5769/c2018009","DOIUrl":"https://doi.org/10.5769/c2018009","url":null,"abstract":"","PeriodicalId":275250,"journal":{"name":"Proceedings of The Tenth International Conference on Forensic Computer Science and Cyber Law","volume":"31 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125472601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecção de Cibercrime em Redes Sociais: Machine Learning","authors":"Jackson Mallmann, A. A. S. Xavier, A. Santin","doi":"10.5769/C2018005","DOIUrl":"https://doi.org/10.5769/C2018005","url":null,"abstract":"","PeriodicalId":275250,"journal":{"name":"Proceedings of The Tenth International Conference on Forensic Computer Science and Cyber Law","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123179950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilização de Redes Neurais Nebulosas para criação de um Sistema Especialista em Invasões Cibernéticas","authors":"B. Petroni, Rodrigo Franco Gonçalves","doi":"10.5769/C2018003","DOIUrl":"https://doi.org/10.5769/C2018003","url":null,"abstract":"","PeriodicalId":275250,"journal":{"name":"Proceedings of The Tenth International Conference on Forensic Computer Science and Cyber Law","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127428161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crimes Eleitorais Cibernéticos nas Campanhas Eleitorais Pela Internet","authors":"Paulo Quintiliano","doi":"10.5769/C2018011","DOIUrl":"https://doi.org/10.5769/C2018011","url":null,"abstract":"","PeriodicalId":275250,"journal":{"name":"Proceedings of The Tenth International Conference on Forensic Computer Science and Cyber Law","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116987631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Uma Revisão das Técnicas Forenses Aplicadas aos Dispositivos Móveis","authors":"M. Klinczak","doi":"10.5769/C2018006","DOIUrl":"https://doi.org/10.5769/C2018006","url":null,"abstract":"","PeriodicalId":275250,"journal":{"name":"Proceedings of The Tenth International Conference on Forensic Computer Science and Cyber Law","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130652111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}