Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

31 results
Image document

Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers

Chun-Fai Chan , Kam-Pui Chow , Siu-Ming Yiu , Ken Yau
14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.351-367, ⟨10.1007/978-3-319-99277-8_19⟩
Conference papers hal-01988832v1
Image document

A Forensic Logging System for Siemens Programmable Logic Controllers

Ken Yau , Kam-Pui Chow , Siu-Ming Yiu
14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.331-349, ⟨10.1007/978-3-319-99277-8_18⟩
Conference papers hal-01988850v1
Image document

Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery

Jun Zhang , Meiqi He , Siu-Ming Yiu
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.185-204, ⟨10.1007/978-3-319-61176-1_10⟩
Conference papers hal-01684371v1
Image document

A Generic Bayesian Belief Model for Similar Cyber Crimes

Hayson Tse , Kam-Pui Chow , Michael Kwan
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.243-255, ⟨10.1007/978-3-642-41148-9_17⟩
Conference papers hal-01460609v1
Image document

$\mathcal{SMS}$: Collaborative $\mathcal{S}$treaming in $\mathcal{M}$obile $\mathcal{S}$ocial Networks

Chenguang Kong , Chuan Wu , Victor Li
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.275-287, ⟨10.1007/978-3-642-20798-3_21⟩
Conference papers hal-01597972v1
Image document

An Analysis of the Green Dam Youth Escort Software

Frankie Li , Hilton Chan , Kam-Pui Chow , Pierre Lai
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.49-62, ⟨10.1007/978-3-642-15506-2_4⟩
Conference papers hal-01060609v1
Image document

Reasoning about Evidence using Bayesian Networks

Hayson Tse , Kam-Pui Chow , Michael Kwan
8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.99-113, ⟨10.1007/978-3-642-33962-2_7⟩
Conference papers hal-01523702v1
Image document

Using a Local Search Warrant to Acquire Evidence Stored Overseas via the Internet

Kenny Wang
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.37-48, ⟨10.1007/978-3-642-15506-2_3⟩
Conference papers hal-01060608v1
Image document

Evaluation of Evidence in Internet Auction Fraud Investigations

Michael Kwan , Richard Overill , Kam-Pui Chow , Jantje Silomon , Hayson Tse , et al.
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.121-132, ⟨10.1007/978-3-642-15506-2_9⟩
Conference papers hal-01060616v1
Image document

Identifying First Seeders in Foxy Peer-to-Peer Networks

Ricci Ieong , Pierre Lai , Kam-Pui Chow , Michael Kwan , Frank Law
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.151-168, ⟨10.1007/978-3-642-15506-2_11⟩
Conference papers hal-01060615v1
Image document

Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning

Yichen Wei , Kam-Pui Chow , Siu-Ming Yiu
16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.273-290, ⟨10.1007/978-3-030-56223-6_15⟩
Conference papers hal-03657238v1
Image document

Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines

Ken Yau , Kam-Pui Chow , Siu-Ming Yiu
16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.95-108, ⟨10.1007/978-3-030-56223-6_6⟩
Conference papers hal-03657239v1
Image document

Forensic Analysis of Popular Chinese Internet Applications

Ying Yang , Kam-Pui Chow , Lucas Hui , Chunxiao Wang , Lijuan Chen , et al.
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.285-295, ⟨10.1007/978-3-642-15506-2_20⟩
Conference papers hal-01060625v1
Image document

Identifying Volatile Data from Multiple Memory Dumps in Live Forensics

Frank Law , Patrick Chan , Siu-Ming Yiu , Benjamin Tang , Pierre Lai , et al.
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.185-194, ⟨10.1007/978-3-642-15506-2_13⟩
Conference papers hal-01060618v1
Image document

Detecting Anomalous Programmable Logic Controller Events Using Machine Learning

Ken Yau , Kam-Pui Chow
13th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2017, Orlando, FL, United States. pp.81-94, ⟨10.1007/978-3-319-67208-3_5⟩
Conference papers hal-01716409v1
Image document

Validation of Rules Used in Foxy Peer-to-Peer Network Investigations

Ricci Ieong , Kam-Pui Chow , Pierre Lai
8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.231-245, ⟨10.1007/978-3-642-33962-2_16⟩
Conference papers hal-01523719v1
Image document

Detecting Anomalies in Programmable Logic Controllers Using Unsupervised Machine Learning

Chun-Fai Chan , Kam-Pui Chow , Cesar Mak , Raymond Chan
15th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2019, Orlando, FL, United States. pp.119-130, ⟨10.1007/978-3-030-28752-8_7⟩
Conference papers hal-02534603v1
Image document

The Cloud Storage Ecosystem – A New Business Model for Internet Piracy?

Raymond Chan , Kam-Pui Chow , Vivien Chan , Michael Kwan
12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.237-255, ⟨10.1007/978-3-319-46279-0_12⟩
Conference papers hal-01758684v1
Image document

Web User Profiling Based on Browsing Behavior Analysis

Xiao-Xi Fan , Kam-Pui Chow , Fei Xu
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.57-71, ⟨10.1007/978-3-662-44952-3_5⟩
Conference papers hal-01393760v1
Image document

Profiling Flash Mob Organizers in Web Discussion Forums

Vivien Chan , Kam-Pui Chow , Raymond Chan
12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.281-293, ⟨10.1007/978-3-319-46279-0_14⟩
Conference papers hal-01758678v1
Image document

Measuring Evidential Weight in Digital Forensic Investigations

Richard Overill , Kam-Pui Chow
14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.3-10, ⟨10.1007/978-3-319-99277-8_1⟩
Conference papers hal-01988848v1
Image document

Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation

Shuhui Hou , Ryoichi Sasaki , Tetsutaro Uehara , Siuming Yiu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.312-317, ⟨10.1007/978-3-642-36818-9_33⟩
Conference papers hal-01480187v1
Image document

An Empirical Study Profiling Internet Pirates

Pierre Lai , Kam-Pui Chow , Xiao-Xi Fan , Vivien Chan
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.257-272, ⟨10.1007/978-3-642-41148-9_18⟩
Conference papers hal-01460610v1
Image document

Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations

Michael Kwan , Richard Overill , Kam-Pui Chow , Hayson Tse , Frank Law , et al.
7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.231-243, ⟨10.1007/978-3-642-24212-0_18⟩
Conference papers hal-01569550v1
Image document

Dynamic Software Birthmark for Java Based on Heap Memory Analysis

Patrick Chan , Lucas Hui , S. M. Yiu
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.94-107, ⟨10.1007/978-3-642-24712-5_8⟩
Conference papers hal-01596200v1
Image document

Predicting the locations of unrest using social media

Shengzhi Qin , Qiaokun Wen , Kam-Pui Chow
17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.177-191, ⟨10.1007/978-3-030-88381-2_9⟩
Conference papers hal-03764379v1
Image document

Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors

Weiqing Huang , Chenggang Jia , Min Yu , Kam-Pui Chow , Jiuming Chen , et al.
16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.57-72, ⟨10.1007/978-3-030-56223-6_4⟩
Conference papers hal-03657237v1
Image document

An Exploratory Profiling Study of Online Auction Fraudsters

Vivien Chan , Kam-Pui Chow , Michael Kwan , Guy Fong , Michael Hui , et al.
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.43-56, ⟨10.1007/978-3-662-44952-3_4⟩
Conference papers hal-01393758v1
Image document

Validation Rules for Enhanced Foxy P2P Network Investigations

Ricci Ieong , Kam-Pui Chow
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.73-83, ⟨10.1007/978-3-662-44952-3_6⟩
Conference papers hal-01393761v1
Image document

Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones

Junbin Fang , Zoe Jiang , Kam-Pui Chow , Siu-Ming Yiu , Lucas Hui , et al.
8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.129-142, ⟨10.1007/978-3-642-33962-2_9⟩
Conference papers hal-01523716v1