Results 1 to 5 of 5
Page 1 of 1
Challenges to Personal Data Protection in Cloud ComputingCheung, ASY; Ieong, R; Chow, KP; Weber, RH201358
Validation of rules used in foxy peer-to-peer network investigationsIeong, R; Chow, KP; Lai, P201261
Identifying first seeders in foxy peer to peer networksIeong, R; Lai, P; Chow, KP; Kwan, M; Law, F2010100
Identifying volatile data from multiple memory dumps in live forensicsLaw, F; Chan, P; Yiu, SM; Tang, B; Lai, P; Chow, KP; Ieong, R; Kwan, M; Hon, WK; Hui, L2010101
Identifying static and dynamic volatile memory data from multiple dumps for live forensicsLaw, FYW; Chan, PF; Yiu, SM; Tang, B; Lai, PKY; Chow, KP; Ieong, R; Kwan, MYK; Hon, WK; Hui, LCK2010182
Page 1 of 1
Export Records
Step 1: Select content and export format
  • Citation only
Step 2: Select export method
  • Download