Discovery - Top 10
Type
Date issued
(6)
(22)
(51)
(36)
(16)
(6)
(1)
(3)
(2)
Journal/Proceeding/Conference
(1)
Language
(142)
HKU Organizations
Search
Add filters:
Use filters to refine the search results.
Title | Author(s) | Issue Date | |
---|---|---|---|
Strong Cryptographic Library - Implementation and Applications Proceeding/Conference:Proceedings of the 9th Hong Kong computer Society Database Conference | 1999 | ||
1987 | |||
Digital evidence search kit Proceeding/Conference:Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering | 2005 | ||
Separable and anonymous identity-based key issuing Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2005 | ||
Forensic investigation of peer-to-peer networks Book:Handbook of research on computational forensics, digital crime, and investigation: methods and solutions | 2009 | ||
Automatic Analysis and Reasoning Based on Vulnerability Knowledge Graph Proceeding/Conference:Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife Proceedings | 2019 | ||
An Incident Response Model for Industrial Control System Forensics Based on Historical Events Proceeding/Conference:Critical Infrastructure Protection XIII: 13th IFIP WG 11.10 International Conference on Critical Infrastructure Protection | 2019 | ||
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines Proceeding/Conference:Advances in Digital Forensics XVI: 16th IFIP WG 11.9 International Conference on Digital Forensics (DigitalForensics 2020) | 2020 | ||
Forensic analysis of a Siemens Programmable Logic Controller Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2016 | ||
Profiling flash mob organizers in web discussion forums Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2016 | ||
The cloud storage ecosystem – A new business model for internet piracy? Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2016 | ||
Applying machine learning to PLC event detection and logging for forensic purpose Proceeding/Conference:13th Annual IFIP WG 11.9 International Conference on Digital Forensics | 2017 | ||
Recovery of heavily fragmented JPEG files Proceeding/Conference:Digital Investigation | 2016 | ||
Threat analysis of an elevator control system Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2017 | ||
Extended abstract: Anti-DDoS technique using self-learning bloom filter Proceeding/Conference:IEEE International Conference on Intelligence and Security Informatics (ISI) | 2017 | ||
The Majority Report - Can we use big data to secure a better future? Journal:International Journal of Business & Cyber Security | 2016 | ||
Detecting Anomalous Behavior of PLC using Semi-supervised Machine Learning Proceeding/Conference:IEEE Conference on Communications and Network Security (CNS) | 2017 | ||
Challenges to Personal Data Protection in Cloud Computing Journal:Journal of Law & Economic Regulation | 2013 | ||
Validation Rules for Enhancing Foxy P2P Network Investigations Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics | 2014 | ||
An Exploratory Study of Profiling Online Auction Offenders Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics | 2014 | ||
Web User Profiling and Identification Based on Browsing Behavior Analysis Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics | 2014 | ||
Authorship attribution for forensic investigation with thousands of authors Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2014 | ||
An Empirical Study Profiling Internet Pirates Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2013 | ||
Effects of motivation and demography on the quantitative plausibility of the Trojan Horse defence against possession of child pornography Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013 | 2013 | ||
Empirical evaluation of information leakage detection using net-flow analysis Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013 | 2013 |