Frank Y. W. Law

According to our database1, Frank Y. W. Law authored at least 16 papers between 2007 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Understanding Computer Forensics Requirements in China Via The "Panda Burning Incense" Virus Case.
J. Digit. Forensics Secur. Law, 2014

2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Inf. Forensics Secur., 2013

2011
Protecting Digital Data Privacy in Computer Forensic Examination.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

2010
Forensic Investigation of Peer-to-Peer Networks.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Identifying Volatile Data from Multiple Memory Dumps in Live Forensics.
Proceedings of the Advances in Digital Forensics VI, 2010

Evaluation of Evidence in Internet Auction Fraud Investigations.
Proceedings of the Advances in Digital Forensics VI, 2010

Identifying First Seeders in Foxy Peer-to-Peer Networks.
Proceedings of the Advances in Digital Forensics VI, 2010

2009
A Cost-Effective Model for Digital Forensic Investigations.
Proceedings of the Advances in Digital Forensics V, 2009

Analysis of the Digital Evidence Presented in the Yahoo! Case.
Proceedings of the Advances in Digital Forensics V, 2009

A Model for Foxy Peer-to-Peer Network Investigations.
Proceedings of the Advances in Digital Forensics V, 2009

A Host-Based Approach to BotNet Investigation?
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

2008
Protecting Digital Legal Professional Privilege (LPP) Data.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Reasoning About Evidence Using Bayesian Networks.
Proceedings of the Advances in Digital Forensics IV, 2008

2007
The Rules of Time on NTFS File System.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

Consistency Issue on Live Systems Forensics.
Proceedings of the Future Generation Communication and Networking, 2007


  Loading...