Pierre K. Y. Lai

According to our database1, Pierre K. Y. Lai authored at least 22 papers between 2005 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Modeling the initial stage of a file sharing process on a BitTorrent network.
Peer-to-Peer Netw. Appl., 2014

2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Inf. Forensics Secur., 2013

An Empirical Study Profiling Internet Pirates.
Proceedings of the Advances in Digital Forensics IX, 2013

2012
Validation of Rules Used in Foxy Peer-to-Peer Network Investigations.
Proceedings of the Advances in Digital Forensics VIII, 2012

2011
Protecting Digital Data Privacy in Computer Forensic Examination.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

2010
Forensic Investigation of Peer-to-Peer Networks.
Proceedings of the Handbook of Research on Computational Forensics, 2010

An Analysis of the Green Dam Youth Escort Software.
Proceedings of the Advances in Digital Forensics VI, 2010

Identifying Volatile Data from Multiple Memory Dumps in Live Forensics.
Proceedings of the Advances in Digital Forensics VI, 2010

Evaluation of Evidence in Internet Auction Fraud Investigations.
Proceedings of the Advances in Digital Forensics VI, 2010

Identifying First Seeders in Foxy Peer-to-Peer Networks.
Proceedings of the Advances in Digital Forensics VI, 2010

2009
A Cost-Effective Model for Digital Forensic Investigations.
Proceedings of the Advances in Digital Forensics V, 2009

Analysis of the Digital Evidence Presented in the Yahoo! Case.
Proceedings of the Advances in Digital Forensics V, 2009

A Model for Foxy Peer-to-Peer Network Investigations.
Proceedings of the Advances in Digital Forensics V, 2009

A Host-Based Approach to BotNet Investigation?
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

2008
Protecting Digital Legal Professional Privilege (LPP) Data.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Reasoning About Evidence Using Bayesian Networks.
Proceedings of the Advances in Digital Forensics IV, 2008

2007
The Rules of Time on NTFS File System.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

Consistency Issue on Live Systems Forensics.
Proceedings of the Future Generation Communication and Networking, 2007

Improving Disk Sector Integrity Using 3-dimension Hashing Scheme.
Proceedings of the Future Generation Communication and Networking, 2007

2006
An Efficient Bloom Filter Based Solution for Multiparty Private Matching.
Proceedings of the 2006 International Conference on Security & Management, 2006

2005
Digital Evidence Search Kit.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005


  Loading...