Browsing by Author Lai, PKY

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 6 to 15 of 15 < previous 
TitleAuthor(s)Issue DateViews
 
Identifying static and dynamic volatile memory data from multiple dumps for live forensics
Proceeding/Conference:6th IFIP WG 11.9 International Conference on Digital Forensics
2010
162
Improving disk sector integrity using 3-dimension hashing scheme
Proceeding/Conference:International Conference on Future Generation Communication and Networking (FGCN 2007) Proceedings
2007
131
 
Maintaining hard disk integrity with digital legal professional privilege (LPP) data
Journal:IEEE Transactions on Information Forensics and Security
2013
85
 
Memory acquisition: A 2-Take approach
Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009
2009
136
 
A model for foxy peer-to-peer network investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2009
151
 
2014
149
 
Protecting digital legal professional privilege LPP data
Proceeding/Conference:Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008
2008
233
The rules of time on NTFS file system
Proceeding/Conference:Proceedings - SADFE 2007: Second International Workshop on Systematic Approaches to Digital Forensic Engineering
2007
149
 
Sensitivity analysis of a Bayesian network for reasoning about digital forensic evidence
Proceeding/Conference:2010 3rd International Conference on Human-Centric Computing, HumanCom 2010
2010
193
 
Software pirates: a criminal investigation
Proceeding/Conference:Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2012
2012
22