Michael Y. K. Kwan

According to our database1, Michael Y. K. Kwan authored at least 20 papers between 2007 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
The Cloud Storage Ecosystem - A New Business Model for Internet Piracy?
Proceedings of the Advances in Digital Forensics XII, 2016

2014
An Exploratory Profiling Study of Online Auction Fraudsters.
Proceedings of the Advances in Digital Forensics X, 2014

A bayesian belief network for data leakage investigation.
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, 2014

2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Inf. Forensics Secur., 2013

The next generation for the forensic extraction of electronic evidence from mobile telephones.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

A Generic Bayesian Belief Model for Similar Cyber Crimes.
Proceedings of the Advances in Digital Forensics IX, 2013

2012
Reasoning about Evidence using Bayesian Networks.
Proceedings of the Advances in Digital Forensics VIII, 2012

2011
Protecting Digital Data Privacy in Computer Forensic Examination.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

2010
Forensic Investigation of Peer-to-Peer Networks.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Identifying Volatile Data from Multiple Memory Dumps in Live Forensics.
Proceedings of the Advances in Digital Forensics VI, 2010

Evaluation of Evidence in Internet Auction Fraud Investigations.
Proceedings of the Advances in Digital Forensics VI, 2010

Identifying First Seeders in Foxy Peer-to-Peer Networks.
Proceedings of the Advances in Digital Forensics VI, 2010

2009
A Cost-Effective Model for Digital Forensic Investigations.
Proceedings of the Advances in Digital Forensics V, 2009

Analysis of the Digital Evidence Presented in the Yahoo! Case.
Proceedings of the Advances in Digital Forensics V, 2009

A Model for Foxy Peer-to-Peer Network Investigations.
Proceedings of the Advances in Digital Forensics V, 2009

2008
Protecting Digital Legal Professional Privilege (LPP) Data.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Reasoning About Evidence Using Bayesian Networks.
Proceedings of the Advances in Digital Forensics IV, 2008

2007
The Rules of Time on NTFS File System.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

Consistency Issue on Live Systems Forensics.
Proceedings of the Future Generation Communication and Networking, 2007


  Loading...