Showing results 3 to 7 of 7
< previous
Title | Author(s) | Issue Date | |
---|---|---|---|
Forensic investigation of peer-to-peer networks Book:Handbook of research on computational forensics, digital crime, and investigation: methods and solutions | 2009 | ||
5-Jan-2019 | |||
Maintaining hard disk integrity with digital legal professional privilege (LPP) data Journal:IEEE Transactions on Information Forensics and Security | 2013 | ||
Reasoning about evidence using Bayesian networks Proceeding/Conference:IFIP - The International Federation for Information Processing | 2008 | ||
Ganotice, FGShen, XAYuen, JKYChow, YMAWong, AMYChan, KMKZheng, BBChan, LNg, PYLeung, SCBarrett, EChan, HYCChan, WNChan, KWSChan, SLPChan, SCSChan, EWYCheuk, YYJChoy, JHe, QJen, JLNJin, JWKhoo, USLam, HYALam, MPSLaw, YWLee, JCYLeung, FCYLeung, ALiu, RKWLou, VWQLuk, PNg, ZLHNg, AYMPun, MWMSee, MLMShen, JASzeto, GPYTam, EYTTso, WWYWang, NWang, RJWong, JKTWong, JYHYuen, GWYTipoe, GL | 11-May-2023 |