Da-Yu Kao

Orcid: 0000-0002-9378-1074

According to our database1, Da-Yu Kao authored at least 49 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
The Proposed PDCA Model to Counter Money Laundering.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

2021
Drone Forensic Analysis Using Relational Flight Data: A Case Study of DJI Spark and Mavic Air.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Sexual Offenses against Children: Social Learning Theory and Dark Web Reinforcement.
Proceedings of the 23rd International Conference on Advanced Communication Technology, 2021

2020
PrivGRU: Privacy-preserving GRU inference using additive secret sharing.
J. Intell. Fuzzy Syst., 2020

Intelligence-led response: turning theory into law enforcement practice in cyber security incidents.
Int. J. Electron. Bus., 2020

Detecting Cyberbullying "Hotspots" on Twitter: A Predictive Analytics Approach.
Digit. Investig., 2020

LooCipher Ransomware Detection Using Lightweight Packet Characteristics.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

"On the left side, there's nothing right. On the right side, there's nothing left: " Polarization of Political Opinion by News Media.
Proceedings of the Sustainable Digital Communities - 15th International Conference, 2020

Exponential Random Graph Modeling of Co-Offender Drug Crimes.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

A Triage Triangle Strategy for Law Enforcement to Reduce Digital Forensic Backlogs.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Forensic Artifacts of Network Traffic on WeChat Calls.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Tool Mark Identification of Skype Traffic.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Hacking Tool Identification in Penetration Testing.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Comprehending Taiwan ATM Heist: From Cyber-attack Phases to Investigation Processes.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

Using the Actionable Intelligence Approach for the DPI of Cybercrime Insider Investigation.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

2019
Exploring drug-related crimes with social network analysis.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Using Google Maps to Track Down Suspects in a Criminal Investigation.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Drone Forensic Investigation: DJI Spark Drone as A Case Study.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Malware Image Classification Using One-Shot Learning with Siamese Networks.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

The Governance of Digital Forensic Investigation in Law Enforcement Agencies.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

Analyzing WannaCry Ransomware Considering the Weapons and Exploits.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

Event Observation of Date-time Stamps for ADS Reconstruction.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

ATM Heist Threats: A Proposed ICT Governance Strategy.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

Cybercrime Countermeasure of Insider Threat Investigation.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

2018
Reconstructing ADS data hiding in windows NTFS: A temporal analysis.
Digit. Investig., 2018

Following the breadcrumbs: Timestamp pattern identification for cloud forensics.
Digit. Investig., 2018

A Framework for SQL Injection Investigations: Detection, Investigation, and Forensics.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

WhatsApp network forensics: Discovering the communication payloads behind cybercriminals.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

User-side evil twin attack detection using time-delay statistics of TCP connection termination.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

Forensic analysis of network packets from penetration test toolkits.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

The dynamic analysis of WannaCry ransomware.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

The static analysis of WannaCry ransomware.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

2017
The Cyberbullying Assessment of Capable Guardianship in Routine Activity Theory.
Proceedings of the Intelligence and Security Informatics - 12th Pacific Asia Workshop, 2017

Differentiating the Investigation Response Process of Cyber Security Incident for LEAs.
Proceedings of the Intelligence and Security Informatics - 12th Pacific Asia Workshop, 2017

2016
Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments.
J. Supercomput., 2016

2015
A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO/IEC 27037: 2012.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Performing an APT Investigation: Using People-Process-Technology-Strategy Model in Digital Triage Forensics.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
Rational Choice Observation of Malware Authors in Taiwan.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2014

An Iterative Management Model of Exploring Windows Date-Time Stamps in Cloud Storage Forensics.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Frameworks in Evidence Collection in Forensics by Analyzing Temporal Cloud Storage Forensics.
Proceedings of the Intelligent Systems and Applications, 2014

2011
A Trustworthy Computing of ADAPT Principle Guaranteeing Genuine Medical Image.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

2010
SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases.
Comput. Law Secur. Rev., 2010

2009
Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models.
Comput. Stand. Interfaces, 2009

Persistence and desistance: Examining the impact of re-integrative shaming to ethics in Taiwan juvenile hackers.
Comput. Law Secur. Rev., 2009

2008
Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks.
Proceedings of the Intelligence and Security Informatics, 2008

Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Internet forensics on the basis of evidence gathering with Peep attacks.
Comput. Stand. Interfaces, 2007

2006
Digitized Forensic Investigation at P2P Copyright Controversy, Infringement.
Proceedings of the Intelligence and Security Informatics, 2006


  Loading...