K. P. Chow

According to our database1, K. P. Chow authored at least 101 papers between 1996 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Fraud Track on Secure Electronic Check System.
IJDCF, 2018

A Framework for Dark Web Threat Intelligence Analysis.
IJDCF, 2018

Forensic-Aware Anti-DDoS Device.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

A Forensic Logging System for Siemens Programmable Logic Controllers.
Proceedings of the Advances in Digital Forensics XIV, 2018

Measuring Evidential Weight in Digital Forensic Investigations.
Proceedings of the Advances in Digital Forensics XIV, 2018

Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers.
Proceedings of the Advances in Digital Forensics XIV, 2018

2017
Extended abstract: Anti-DDoS technique using self-learning bloom filter.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Detecting Anomalous Programmable Logic Controller Events Using Machine Learning.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

Threat Analysis of an Elevator Control System.
Proceedings of the Critical Infrastructure Protection XI, 2017

Detecting anomalous behavior of PLC using semi-supervised machine learning.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
The Cloud Storage Ecosystem - A New Business Model for Internet Piracy?
Proceedings of the Advances in Digital Forensics XII, 2016

Profiling Flash Mob Organizers in Web Discussion Forums.
Proceedings of the Advances in Digital Forensics XII, 2016

Forensic Analysis of a Siemens Programmable Logic Controller.
Proceedings of the Critical Infrastructure Protection X, 2016

Interest Profiling for Security Monitoring and Forensic Investigation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
PLC Forensics Based on Control Program Logic Change Detection.
JDFSL, 2015

Tracking and Taxonomy of Cyberlocker Link Sharers Based on Behavior Analysis.
JDFSL, 2015

LCCT: A Semi-supervised Model for Sentiment Classification.
Proceedings of the NAACL HLT 2015, The 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, USA, May 31, 2015

An Information Extraction Framework for Digital Forensic Investigations.
Proceedings of the Advances in Digital Forensics XI, 2015

A Privacy-Preserving Encryption Scheme for an Internet Realname Registration System.
Proceedings of the Advances in Digital Forensics XI, 2015

Fragmented JPEG File Recovery Using Pseudo Headers.
Proceedings of the Advances in Digital Forensics XI, 2015

Profiling and Tracking a Cyberlocker Link Sharer in a Public Web Forum.
Proceedings of the Advances in Digital Forensics XI, 2015

Cyber Attacks and Political Events: The Case of the Occupy Central Campaign.
Proceedings of the Critical Infrastructure Protection IX, 2015

2014
Modeling the initial stage of a file sharing process on a BitTorrent network.
Peer-to-Peer Networking and Applications, 2014

Understanding Computer Forensics Requirements in China Via The "Panda Burning Incense" Virus Case.
JDFSL, 2014

Authorship Attribution for Forensic Investigation with Thousands of Authors.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Validation Rules for Enhanced Foxy P2P Network Investigations.
Proceedings of the Advances in Digital Forensics X, 2014

Web User Profiling Based on Browsing Behavior Analysis.
Proceedings of the Advances in Digital Forensics X, 2014

An Exploratory Profiling Study of Online Auction Fraudsters.
Proceedings of the Advances in Digital Forensics X, 2014

Learning Domain-specific Sentiment Lexicon with Supervised Sentiment-aware LDA.
Proceedings of the ECAI 2014 - 21st European Conference on Artificial Intelligence, 18-22 August 2014, Prague, Czech Republic, 2014

A bayesian belief network for data leakage investigation.
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, 2014

A Topic Model for Building Fine-grained Domain-specific Emotion Lexicon.
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014

2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Information Forensics and Security, 2013

Unknown Chinese word extraction based on variety of overlapping strings.
Inf. Process. Manage., 2013

Photo Forensics on Shanzhai Mobile Phone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

The next generation for the forensic extraction of electronic evidence from mobile telephones.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

Quantification of digital forensic hypotheses using probability theory.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

A Three-Dimensional Evaluation Model for Network Management System.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

A Generic Bayesian Belief Model for Similar Cyber Crimes.
Proceedings of the Advances in Digital Forensics IX, 2013

An Empirical Study Profiling Internet Pirates.
Proceedings of the Advances in Digital Forensics IX, 2013

Towards a Better Similarity Measure for Keyword Profiling via Clustering.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
Reasoning about Evidence using Bayesian Networks.
Proceedings of the Advances in Digital Forensics VIII, 2012

Validation of Rules Used in Foxy Peer-to-Peer Network Investigations.
Proceedings of the Advances in Digital Forensics VIII, 2012

Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones.
Proceedings of the Advances in Digital Forensics VIII, 2012

2011
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics.
Journal of Zhejiang University - Science C, 2011

Protecting Digital Data Privacy in Computer Forensic Examination.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

A Dual Cube Hashing Scheme for Solving LPP Integrity Problem.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

Sockpuppet Detection in Online Discussion Forums.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Development of Domestic and International Computer Forensics.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Automatic Online Monitoring and Data-Mining Internet Forums.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

2010
Forensic Investigation of Peer-to-Peer Networks.
Proceedings of the Handbook of Research on Computational Forensics, 2010

New Differential Cryptanalytic Results for Reduced-Round CAST-128.
IEICE Transactions, 2010

Forensic Analysis of Popular Chinese Internet Applications.
Proceedings of the Advances in Digital Forensics VI, 2010

An Analysis of the Green Dam Youth Escort Software.
Proceedings of the Advances in Digital Forensics VI, 2010

Identifying Volatile Data from Multiple Memory Dumps in Live Forensics.
Proceedings of the Advances in Digital Forensics VI, 2010

Evaluation of Evidence in Internet Auction Fraud Investigations.
Proceedings of the Advances in Digital Forensics VI, 2010

Identifying First Seeders in Foxy Peer-to-Peer Networks.
Proceedings of the Advances in Digital Forensics VI, 2010

Security Issues and Challenges for Cyber Physical System.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

A Complexity Based Model for Quantifying Forensic Evidential Probabilities.
Proceedings of the ARES 2010, 2010

2009
A Cost-Effective Model for Digital Forensic Investigations.
Proceedings of the Advances in Digital Forensics V, 2009

Analysis of the Digital Evidence Presented in the Yahoo! Case.
Proceedings of the Advances in Digital Forensics V, 2009

A Model for Foxy Peer-to-Peer Network Investigations.
Proceedings of the Advances in Digital Forensics V, 2009

Privacy Reference Monitor - A Computer Model for Law Compliant Privacy Protection.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Automatic 3D face texture mapping framework from single image.
Proceedings of the First International Conference on Internet Multimedia Computing and Service, 2009

Super-Resolution of Faces Using Texture Mapping on a Generic 3D Model.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

A Host-Based Approach to BotNet Investigation?
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

2008
Protecting Digital Legal Professional Privilege (LPP) Data.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Reasoning About Evidence Using Bayesian Networks.
Proceedings of the Advances in Digital Forensics IV, 2008

2007
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme.
I. J. Network Security, 2007

Watershed segmentation with boundary curvature ratio based merging criterion.
Proceedings of the Signal and Image Processing (SIP 2007), 2007

The Rules of Time on NTFS File System.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

A Hybrid Approach for Authenticating MPEG-2 Streaming Data.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper).
Proceedings of the Information Security Practice and Experience, 2007

Object-Based Surveillance Video Retrieval System with Real-Time Indexing Methodology.
Proceedings of the Image Analysis and Recognition, 4th International Conference, 2007

Consistency Issue on Live Systems Forensics.
Proceedings of the Future Generation Communication and Networking, 2007

Improving Disk Sector Integrity Using 3-dimension Hashing Scheme.
Proceedings of the Future Generation Communication and Networking, 2007

2006
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed.
IEEE Journal on Selected Areas in Communications, 2006

Practical electronic lotteries with offline TTP.
Computer Communications, 2006

Real-time Multiple Head Shape Detection and Tracking System with Decentralized Trackers.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

An Efficient Bloom Filter Based Solution for Multiparty Private Matching.
Proceedings of the 2006 International Conference on Security & Management, 2006

2005
A generic anti-spyware solution by access control list at kernel level.
Journal of Systems and Software, 2005

Forward-secure multisignature and blind signature schemes.
Applied Mathematics and Computation, 2005

An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Digital Evidence Search Kit.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

Efficient Block-based Motion Segmentation Method using Motion Vector Consistency.
Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2005), 2005

Separable and Anonymous Identity-Based Key Issuing.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An e-Lottery Scheme Using Verifiable Random Function.
Proceedings of the Computational Science and Its Applications, 2005

Dynamic Integrity Verification for Software Self-defense.
Proceedings of The 2005 International Conference on Security and Management, 2005

Two Improved Partially Blind Signature Schemes from Bilinear Pairings.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

Secure Hierarchical Identity Based Signature and Its Application.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Delegation of signing and decryption rights using pki proxy memo.
Proceedings of the IASTED International Conference on Software Engineering, 2004

Risk Management of Corporate Confidential Information in Digital Form.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

Tuning the Collision Test for Power.
Proceedings of the Computer Science 2004, 2004

2003
A Secure Modified ID-Based Undeniable Signature Scheme.
IACR Cryptology ePrint Archive, 2003

Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
Proceedings of the Information Security and Cryptology, 2003

2001
Security of Wang et al.'s group-oriented (t, n) threshold signature schemes with traceable signers.
Inf. Process. Lett., 2001

2000
Security of Tseng-Jan's group signature schemes.
Inf. Process. Lett., 2000

Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms.
Proceedings of the Public Key Cryptography, 2000

1996
The Telephone Directory Enquiry System of Hong Kong.
Proceedings of the 3rd Asia-Pacific Software Engineering Conference (APSEC '96), 1996


  Loading...