115 results on '"Kao, Da-Yu"'
Search Results
2. Drone Forensic Analysis Using Relational Flight Data: A Case Study of DJI Spark and Mavic Air
3. LooCipher Ransomware Detection Using Lightweight Packet Characteristics
4. Exploring drug-related crimes with social network analysis
5. Drone Forensic Investigation: DJI Spark Drone as A Case Study
6. Using Google Maps to Track Down Suspects in a Criminal Investigation
7. Malware Image Classification Using One-Shot Learning with Siamese Networks
8. Identifying Temporal Patterns Using ADS in NTFS for Digital Forensics
9. Differentiating the Investigation Response Process of Cyber Security Incident for LEAs
10. The Cyberbullying Assessment of Capable Guardianship in Routine Activity Theory
11. An Iterative Management Model of Exploring Windows Date-Time Stamps in Cloud Storage Forensics
12. Privacy Breach Investigations of Incident Response to Personal Information Protection Act
13. Rational Choice Observation of Malware Authors in Taiwan
14. Identifying Temporal Patterns Using ADS in NTFS for Digital Forensics
15. Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks
16. Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments
17. Differentiating the Investigation Response Process of Cyber Security Incident for LEAs
18. The Cyberbullying Assessment of Capable Guardianship in Routine Activity Theory
19. Digitized Forensic Investigation at P2P Copyright Controversy, Infringement
20. SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases
21. Sexual Offenses against Children: Social Learning Theory and Dark Web Reinforcement
22. Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models
23. Persistence and desistance: Examining the impact of re-integrative shaming to ethics in Taiwan juvenile hackers
24. An Iterative Management Model of Exploring Windows Date-Time Stamps in Cloud Storage Forensics
25. Rational Choice Observation of Malware Authors in Taiwan
26. Internet forensics on the basis of evidence gathering with Peep attacks
27. Sexual Offenses against Children: Social Learning Theory and Dark Web Reinforcement
28. Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks
29. Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps
30. PrivGRU: Privacy-preserving GRU inference using additive secret sharing
31. Digitized Forensic Investigation at P2P Copyright Controversy, Infringement
32. Exponential Random Graph Modeling of Co-Offender Drug Crimes
33. Forensic Artifacts of Network Traffic on WeChat Calls
34. Hacking Tool Identification in Penetration Testing
35. Comprehending Taiwan ATM Heist: From Cyber-attack Phases to Investigation Processes
36. A Triage Triangle Strategy for Law Enforcement to Reduce Digital Forensic Backlogs
37. Tool Mark Identification of Skype Traffic
38. Using the Actionable Intelligence Approach for the DPI of Cybercrime Insider Investigation
39. Intelligence-led response: turning theory into law enforcement practice in cyber security incidents
40. Intelligence-led response: turning theory into law enforcement practice in cyber security incidents
41. The Governance of Digital Forensic Investigation in Law Enforcement Agencies
42. Cybercrime Countermeasure of Insider Threat Investigation
43. Event Observation of Date-time Stamps for ADS Reconstruction
44. Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations
45. ATM Heist Threats: A Proposed ICT Governance Strategy
46. Analyzing WannaCry Ransomware Considering the Weapons and Exploits
47. Malware-Detection Model Using Learning-Based Discovery of Static Features
48. Strategy for Detecting IP Address of LINE VOIP Network Packets by Using the Decision-Tree Approach
49. Digital Evidence Analytics Applied in Cybercrime Investigations
50. A Framework for SQL Injection Investigations: Detection, Investigation, and Forensics
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.