7 results on '"Kao, Da-Yu"'
Search Results
2. Forensic Artifacts of Network Traffic on WeChat Calls
3. Hacking Tool Identification in Penetration Testing
4. Comprehending Taiwan ATM Heist: From Cyber-attack Phases to Investigation Processes
5. A Triage Triangle Strategy for Law Enforcement to Reduce Digital Forensic Backlogs
6. Tool Mark Identification of Skype Traffic
7. Using the Actionable Intelligence Approach for the DPI of Cybercrime Insider Investigation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.