2010

Sensitivity Analysis of a Bayesian Network for Reasoning about Digital Forensic Evidence

 

A Complexity Based Model for Quantifying Forensic Evidential Probabilities

 

Evaluation of Evidence in Internet Auction Fraud Investigations

 

Identifying Volatile Memory Data from Multiple Memory Dumps in Live Forensics

 

Identifying First Seeders in Foxy Peer-to-Peer Networks

 

An Analysis of the Green Dam Youth Escort Software

 

Forensic Analysis of Popular Chinese Internet Applications


2009

Privacy Reference Monitor – A Computer Model for Law Compliant Privacy Protection

 

Analyzing Storage Media of Digital Camera

 

Memory Acquisition: A 2-Take Approach

 

A Host-based Approach to BotNet Investigation

 

Forensic Investigation of Peer-to-Peer Networks

Coming soon
 

A Digital Forensics View of the Yahoo! Case

 

A Cost-Effective Digial Forensic Investigation Model

 

A Heuristic Approach for Investigating the P2P Foxy Network


2008

Security Analysis of the Foxy Peer-to-Peer File Sharing Tool

 

Protecting Digital Legal Professional Privilege (LPP) Data

 

Reasoning About Evidence using Bayesian Networks


2007

Consistency Issue on Live Systems Forensics

 

Improving Disk Sector Integrity Using 3-dimension Hashing Scheme

 

BTM – An Automated Rule-based BT Monitoring System for Piracy Detection

 

Tools and Technology for Computer Forensics: Research and Development in Hong Kong (invited paper)

 

The Rules of Time on NTFS File System


2006

Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed


2005

Digital Evidence Search Kit

 

A Generic Anti-Spyware Solution by Access Control List at Kernel Level


2002

Design of a Cyber Forensic Tool (invited paper)

 

Review of the Electronic Transaction Ordinance




2007

Object-based Surveillance Video Retrieval SystemWith Real-Time Indexing Methodology

 

Watershed Segmentation with Boundary Curvature Ratio Based Merging Criterion

 

Home | About Us | People | Projects | Publications | Case Analysis

Copyright © 1998 - 2007 Center for Information Security and Cryptography (CISC), Dept. of Computer Science, HKU. All rights reserved.