关注
Chad Steel
Chad Steel
在 gmu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Child pornography in peer-to-peer networks
CMS Steel
Child Abuse & Neglect 33 (8), 560-568, 2009
1142009
Web-based child pornography: The global impact of deterrence efforts and its consumption on mobile platforms
CMS Steel
Child abuse & neglect 44, 150-158, 2015
832015
Windows forensics: The field guide for conducting corporate computer investigations
C Steel
John wiley & sons, 2006
612006
A systematic review of cognitive distortions in online child sexual exploitation material offenders
CMS Steel, E Newman, S O'Rourke, E Quayle
Aggression and violent behavior 51, 101375, 2020
382020
An integrative review of historical technology and countermeasure usage trends in online child sexual exploitation material offenders
CMS Steel, E Newman, S O’Rourke, E Quayle
Forensic Science International: Digital Investigation 33, 300971, 2020
372020
Stolen identity valuation and market evolution on the dark web
CMS Steel
International Journal of Cyber Criminology 13 (1), 70-83, 2019
272019
Web-based child pornography: Quantification and qualification of demand
CMS Steel
International Journal of Digital Crime and Forensics (IJDCF) 1 (4), 58-69, 2009
272009
Public perceptions of child pornography and child pornography consumers
CMS Steel, E Newman, S O’Rourke, E Quayle
Archives of sexual behavior 51 (2), 1173-1185, 2022
262022
Idiographic digital profiling: Behavioral analysis based on digital forensics
CM Steel
Journal of Digital Forensics, Security and Law 9 (1), 1, 2014
242014
Collecting and viewing behaviors of child sexual exploitation material offenders
CMS Steel, E Newman, S O'Rourke, E Quayle
Child Abuse & Neglect 118, 105133, 2021
212021
The mask-SIFT cascading classifier for pornography detection
CMS Steel
World Congress on Internet Security (WorldCIS-2012), 139-142, 2012
212012
Lawless space theory for online child sexual exploitation material offending
CMS Steel, E Newman, S O’Rourke, E Quayle
Aggression and violent behavior 68, 101809, 2023
172023
Digital Child Pornography: A Practical Guide for Investigators
CMS Steel
Lily Shiba Press, 2014
172014
Impersonator identification through dynamic fingerprinting
CMS Steel, CT Lu
digital investigation 5 (1-2), 60-70, 2008
102008
Technical behaviours of child sexual exploitation material offenders
C Steel, E Newman, S O'Rourke, E Quayle
Journal of Digital Forensics, Security and Law 17, 2022
92022
The asperger's defence in digital child pornography investigations
C Steel
Psychiatry, psychology and law 23 (3), 473-482, 2016
82016
Improving child sexual exploitation material investigations: Recommendations based on a review of recent research findings
CMS Steel, E Newman, S O’Rourke, E Quayle
The Police Journal 97 (1), 150-165, 2024
62024
Self perceptions and cognitions of child sexual exploitation material offenders
CMS Steel, E Newman, S O’Rourke, E Quayle
International journal of offender therapy and comparative criminology 67 (10 …, 2023
62023
Suicidal ideation in offenders convicted of child sexual exploitation material offences
CMS Steel, E Newman, S O’Rourke, E Quayle
Behavioral Sciences & the law 40 (3), 365-378, 2022
62022
Technical soddi defenses: The Trojan Horse defense revisited
CM Steel
Journal of Digital Forensics, Security and Law 9 (4), 4, 2014
62014
系统目前无法执行此操作,请稍后再试。
文章 1–20