Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,377,772 papers from all fields of science
Search
Sign In
Create Free Account
Child Exploitation Tracking System
Known as:
CETS
Child Exploitation Tracking System (CETS) is a Microsoft software based solution that assists in managing and linking worldwide cases (across…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
National Cyber Security Awareness Month
Software industry
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation
Felix Anda
,
Nhien-An Le-Khac
,
M. Scanlon
Digital Investigation. The International Journal…
2020
Corpus ID: 215998775
2018
2018
Matching Sensor Ontologies Through Compact Evolutionary Tabu Search Algorithm
Xingsi Xue
,
Shijian Liu
International Conference on Security, Privacy…
2018
Corpus ID: 54465228
Although sensor ontologies are regarded as the solution to data heterogeneity on the Semantic Sensor Web (SSW), these sensor…
Expand
2016
2016
Insight Into Electron Traps and Their Energy Distribution Under Positive Bias Temperature Stress and Hot Carrier Aging
M. Duan
,
J. Zhang
,
+7 authors
B. Kaczer
IEEE Transactions on Electron Devices
2016
Corpus ID: 27825454
The access transistor of SRAM can suffer both positive bias temperature instability (PBTI) and hot carrier aging (HCA) during…
Expand
2015
2015
Core Exit Thermocouple Response to Inadequate Core Cooling Using CFD Dynamic Mesh
Liping Cao
,
J. Hartz
,
Hong Xu
,
Justin Figley
2015
Corpus ID: 148566427
The CFD study presented in this paper simulates the thermal response of a Westinghouse Incore Instrument Thimble Assembly (IITA…
Expand
Highly Cited
2013
Highly Cited
2013
Grooming and the ‘Asian sex gang predator’: the construction of a racial crime threat
E. Cockbain
2013
Corpus ID: 27814245
Following a mainstream British newspaper’s claim to have uncovered a new crime threat of ‘on-street grooming’, extensive and…
Expand
2011
2011
Detection of child exploiting chats from a mixed chat dataset as a text classification task
Md. Waliur Rahman Miah
,
J. Yearwood
,
S. Kulkarni
Australasian Language Technology Association…
2011
Corpus ID: 9522614
Detection of child exploitation in Internet chatting is an important issue for the protection of children from prospective online…
Expand
2010
2010
Data Protection and Transborder Data Flow in the European and Global Context
Lingjie Kong
2010
Corpus ID: 145144971
Very similar to trade barriers, data protection has been an obstacle to free global data flow. The European legal system on cross…
Expand
2009
2009
A novel transformer for contactless energy transmission systems
Wei Zhang
,
Qianhong Chen
,
S.C. Wong
,
C. Tse
,
X. Ruan
IEEE Energy Conversion Congress and Exposition
2009
Corpus ID: 2482033
Coupling coefficient k of a transformer is a key parameter affecting the efficiency of a contactless energy transmission systems…
Expand
2008
2008
Child exploitation and communication technologies
A. Gillespie
2008
Corpus ID: 140879748
New communication technology can help abusers gain access to children. It can allow groups of abusers to communicate with and…
Expand
Review
2007
Review
2007
Somalia: Education in Transition
Lee V. Cassanelli
,
Farah Sheikh Abdikadir
2007
Corpus ID: 54507509
We begin with the premise that education is a basic human right, as well as a precondition for any serious effort to return peace…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required