Frank Fu-Yuan Huang

According to our database1, Frank Fu-Yuan Huang authored at least 6 papers between 2006 and 2010.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases.
Comput. Law Secur. Rev., 2010

2009
Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models.
Comput. Stand. Interfaces, 2009

Persistence and desistance: Examining the impact of re-integrative shaming to ethics in Taiwan juvenile hackers.
Comput. Law Secur. Rev., 2009

2008
Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks.
Proceedings of the Intelligence and Security Informatics, 2008

Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2006
Digitized Forensic Investigation at P2P Copyright Controversy, Infringement.
Proceedings of the Intelligence and Security Informatics, 2006


  Loading...