File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Tools and technology for computer forensics: Research and development in Hong Kong (invited paper)

TitleTools and technology for computer forensics: Research and development in Hong Kong (invited paper)
Authors
KeywordsComputer Forensics
Digital Crimes
Forensics Technology
Issue Date2007
PublisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/
Citation
Lecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2007, v. 4464 LNCS, p. 11-19 How to Cite?
AbstractWith the increased use of Internet and information technology all over the world, there is an increased amount of criminal activities that involve computing and digital data. These digital crimes (e-crimes) impose new challenges on prevention, detection, investigation, and prosecution of the corresponding offences. Computer forensics (also known as cyberforensics) is an emerging research area that applies computer investigation and analysis techniques to help detection of these crimes and gathering of digital evidence suitable for presentation in courts. This new area combines the knowledge of information technology, forensics science, and law and gives rise to a number of interesting and challenging problems related to computer security and cryptography that are yet to be solved. In this paper, we present and discuss some of these problems together with two successful cases of computer forensics technology developed in Hong Kong that enable the law enforcement departments to detect and investigate digital crimes more efficiently and effectively. We believe that computer forensics research is an important area in applying security and computer knowledge to build a better society. © Springer-Verlag Berlin Heidelberg 2007.
Persistent Identifierhttp://hdl.handle.net/10722/151905
ISSN
2005 Impact Factor: 0.402
2015 SCImago Journal Rankings: 0.252
References

 

DC FieldValueLanguage
dc.contributor.authorHui, LCKen_US
dc.contributor.authorChow, KPen_US
dc.contributor.authorYiu, SMen_US
dc.date.accessioned2012-06-26T06:30:38Z-
dc.date.available2012-06-26T06:30:38Z-
dc.date.issued2007en_US
dc.identifier.citationLecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2007, v. 4464 LNCS, p. 11-19en_US
dc.identifier.issn0302-9743en_US
dc.identifier.urihttp://hdl.handle.net/10722/151905-
dc.description.abstractWith the increased use of Internet and information technology all over the world, there is an increased amount of criminal activities that involve computing and digital data. These digital crimes (e-crimes) impose new challenges on prevention, detection, investigation, and prosecution of the corresponding offences. Computer forensics (also known as cyberforensics) is an emerging research area that applies computer investigation and analysis techniques to help detection of these crimes and gathering of digital evidence suitable for presentation in courts. This new area combines the knowledge of information technology, forensics science, and law and gives rise to a number of interesting and challenging problems related to computer security and cryptography that are yet to be solved. In this paper, we present and discuss some of these problems together with two successful cases of computer forensics technology developed in Hong Kong that enable the law enforcement departments to detect and investigate digital crimes more efficiently and effectively. We believe that computer forensics research is an important area in applying security and computer knowledge to build a better society. © Springer-Verlag Berlin Heidelberg 2007.en_US
dc.languageengen_US
dc.publisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/en_US
dc.relation.ispartofLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en_US
dc.subjectComputer Forensicsen_US
dc.subjectDigital Crimesen_US
dc.subjectForensics Technologyen_US
dc.titleTools and technology for computer forensics: Research and development in Hong Kong (invited paper)en_US
dc.typeConference_Paperen_US
dc.identifier.emailHui, LCK:hui@cs.hku.hken_US
dc.identifier.emailChow, KP:chow@cs.hku.hken_US
dc.identifier.emailYiu, SM:smyiu@cs.hku.hken_US
dc.identifier.authorityHui, LCK=rp00120en_US
dc.identifier.authorityChow, KP=rp00111en_US
dc.identifier.authorityYiu, SM=rp00207en_US
dc.description.naturelink_to_subscribed_fulltexten_US
dc.identifier.scopuseid_2-s2.0-37149015843en_US
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-37149015843&selection=ref&src=s&origin=recordpageen_US
dc.identifier.volume4464 LNCSen_US
dc.identifier.spage11en_US
dc.identifier.epage19en_US
dc.publisher.placeGermanyen_US
dc.identifier.scopusauthoridHui, LCK=8905728300en_US
dc.identifier.scopusauthoridChow, KP=7202180751en_US
dc.identifier.scopusauthoridYiu, SM=7003282240en_US

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats