Browsing by Author Lai, PKY

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 15 of 15
TitleAuthor(s)Issue DateViews
 
Analysis of the digital evidence presented in the Yahoo! case
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2009
57
 
Analyzing storage media of digital camera
Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009
2009
61
BTM - An automated rule-based BT monitoring system for piracy detection
Proceeding/Conference:International Conference on Internet Monitoring and Protection, ICIMP 2007
2007
74
Consistency Issue on Live Systems Forensics
Proceeding/Conference:Proceedings of Future Generation Communication and Networking, FGCN 2007
2007
56
An efficient bloom filter based solution for multiparty private matching
Proceeding/Conference:Proceedings of The 2006 International Conference on Security and Management, SAM'06
2006
102
 
Identifying static and dynamic volatile memory data from multiple dumps for live forensics
Proceeding/Conference:6th IFIP WG 11.9 International Conference on Digital Forensics
2010
63
Improving disk sector integrity using 3-dimension hashing scheme
Proceeding/Conference:International Conference on Future Generation Communication and Networking (FGCN 2007) Proceedings
2007
33
 
Maintaining hard disk integrity with digital legal professional privilege (LPP) data
Journal:IEEE Transactions on Information Forensics and Security
2013
72
 
Memory acquisition: A 2-Take approach
Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009
2009
46
 
A model for foxy peer-to-peer network investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2009
54
 
2014
111
 
Protecting digital legal professional privilege LPP data
Proceeding/Conference:Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008
2008
59
The rules of time on NTFS file system
Proceeding/Conference:Proceedings - SADFE 2007: Second International Workshop on Systematic Approaches to Digital Forensic Engineering
2007
41
 
Sensitivity analysis of a Bayesian network for reasoning about digital forensic evidence
Proceeding/Conference:2010 3rd International Conference on Human-Centric Computing, HumanCom 2010
2010
69
 
Software pirates: a criminal investigation
Proceeding/Conference:Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2012
2012
112