Publications
-
The Next Generation for the Forensic Extraction of Electronic Evidence from Mobile Telephones
- Authors: Hayson Tse, K.P. Chow, M. Kwan.
- In Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering. 2013, pages 1 - 7.
- doi: 10.1109/SADFE.2013.6911548
- Click here for pdf
-
A Generic Bayesian Belief Model for Similar Cyber Crimes
- Authors: Hayson Tse, K.P. Chow, M. Kwan.
- Advances in Digital Forensics IX. 2013, Vol. 410, pages 243 - 255.
- doi: 10.1007/978-3-642-41148-9_17
- Click here for pdf
-
Software pirates: a criminal investigation
- Authors: Hayson Tse, K.P. Chow, Pierre Lai.
- In 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation. 2012, pages 1 - 10.
- doi: 10.1109/SADFE.2013.6911547
- Click here for pdf
-
Reasoning about Evidence using Bayesian Networks
- Authors: Hayson Tse, K.P. Chow, M. Kwan.
- Advances in Digital Forensics VIII. 2012, Vol. 383, pages 99 - 113.
- doi: 10.1007/978-3-642-33962-2_7
- Click here for pdf
-
Hong Kong Public Prosecutors Face the Challenges of Technology Crimes
- Author: Hayson Tse.
- China Law. 2010, January, pages 80 - 86.
- Click here for pdf
Other publications
-
Effects of motivation and demography on the quantitative plausibility of the trojan horse defence against possession of child pornography
- Authors: R Overill, J Silomon, KP Chow, Hayson Tse.
- Journal of Harbin Institute of Technology. 2014, Vol. 21, No. 6, Pages 9 - 15.
- Click here for pdf.
-
A Bayesian belief network for data leakage investigation
- Authors: F Xu, M Kwan, Hayson Tse, KP Chow.
- In Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, pages 19 - 24.
- doi: 10.1145/2598918.2598919
- Click here for pdf.
-
Quantification of digital forensic hypotheses using probability theory
- Authors: R Overill, J Silomon, KP Chow, Hayson Tse.
- In 2013 IEEE Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering
- doi: 10.1109/SADFE.2013.6911547
- Click here for pdf.
-
Digital Child Pornography: Offender or not Offender
- Authors: F Law, KP Chow, P Lai, Hayson Tse, K Tse.
- Technology for Facilitating Humanity and Combating Social Deviations: Interdisciplinary Perspectives. 2011, Pages 1 - 17.
- doi: 10.4018/978-1-60960-094-5.ch001
- Click here for pdf.
-
Protecting Digital Data Privacy in Computer Forensic Examination
- Authors: F Law, P Chan, SM Yiu, KP Chow, M Kwan, Hayson Tse, P Lai.
- In 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering. Pages 1 - 6.
- doi: 10.1109/SADFE.2011.15
- Click here for pdf.
-
Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations
- Authors: M Kwan, R Overill, KP Chow, Hayson Tse, F Law, P Lai.
- Advances in Digital Forensics VII. 2011, Vol. 361, pages 231 - 243.
- doi: 10.1007/978-3-642-24212-0_18
- Click here for pdf.
-
Evaluation of Evidence in Internet Auction Fraud Investigations
- Authors: M Kwan, R Overill, KP Chow, J Silomon, Hayson Tse, F Law, P Lai.
- Advances in Digital Forensics VI. 2010, Vol. 337, pages 121 - 132.
- doi: 10.1007/978-3-642-15506-2_9
- Click here for pdf.
-
Analyzing Storage Media of Digital Camera
- Authors: K Tse, KP Chow, F Law, R Ieong, M Kwan, Hayson Tse, P Lai.
- In 2nd International Workshop on Forensics for Future Generation Communication environments. Pages 19 - 24.
- doi: 10.1109/CSA.2009.5404201
- Click here for pdf.
-
Forensic Investigation of Peer to Peer Networks
- Authors: R Ieong, P Lai, KP Chow, M Kwan, F Law, Hayson Tse, K Tse.
- Handbook of Research on Computational Forensics, Digital Crime and Investigation. Pages 355 - 378.
- doi: 10.1016/j.diin.2010.05.012
- Click here for pdf.
-
Memory Acquisition: A 2-Take Approach
- Authors: F Law, P Lai, KP Chow, R Ieong, M Kwan, K Tse, Hayson Tse.
- In 2009 International Conference on Computer Science and its Applications.
- doi: 10.1109/CSA.2009.5404199
- Click here for pdf.
-
A Host-Based Approach to BotNet Investigation
- Authors: F Law, KP Chow, P Lai, Hayson Tse.
- Digital Forensics and Cyber Crime. 2009, Vol. 31, pages 161 - 170.
- doi: 10.1007/978-3-642-11534-9_16
- Click here for pdf.
-
Analysis of the Digital Evidence Presented in the Yahoo Case
- Authors: M Kwan, KP Chow, P Lai, F Law, Hayson Tse.
- Advances in Digital Forensics VI. 2009, Vol. 306, pages 241 - 252.
- doi: 10.1007/978-3-642-04155-6_18
- Click here for pdf.
-
Security Analysis of the Foxy Peer-to-Peer File Sharing Tool
- Authors: KP Chow, R Ieong, M Kwan, P Lai, F Law, Hayson Tse, K Tse.
- Tech Report TR-2008-09
- Click here for pdf.