Search Results - "Chow, Kam Pui"
-
1
COVID-19 Sensing: Negative Sentiment Analysis on Social Media in China via BERT Model
Published in IEEE access (01-01-2020)“…Coronavirus disease 2019 (COVID-19) poses massive challenges for the world. Public sentiment analysis during the outbreak provides insightful information in…”
Get full text
Journal Article -
2
An approach to quantifying the plausibility of the inadvertent download defence
Published in Forensic sciences research (01-01-2016)“…A table of 95% confidence limits on the probabilities for randomly downloading relatively small numbers of illegal images or sensitive documents amongst a…”
Get full text
Journal Article -
3
Quantification of digital forensic hypotheses using probability theory
Published in 2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE) (01-11-2013)“…The issue of downloading illegal material from a website onto a personal digital device is considered from the perspective of conventional (Pascalian)…”
Get full text
Conference Proceeding -
4
Deepfake noise investigation and detection
Published in Forensic science international. Digital investigation (Online) (01-07-2022)Get full text
Journal Article -
5
-
6
PLC FORENSICS BASED ON CONTROL PROGRAM LOGIC CHANGE DETECTION WORKS
Published in The journal of digital forensics, security and law (01-10-2015)“…Supervisory Control and Data Acquisition (SCADA) system is an industrial control automated system. It is built with multiple Programmable Logic Controllers…”
Get full text
Journal Article -
7
Analyzing the peeling chain patterns on the Bitcoin blockchain
Published in Forensic science international. Digital investigation (Online) (01-10-2023)Get full text
Journal Article -
8
TAENet: Two-branch Autoencoder Network for Interpretable Deepfake Detection
Published in Forensic science international. Digital investigation (Online) (01-10-2024)“…Deepfake detection attracts increasingly attention due to serious security issues caused by facial manipulation techniques. Recently, deep learning-based…”
Get full text
Journal Article -
9
Sensitivity analysis for a Bitcoin simulation model
Published in Forensic science international. Digital investigation (Online) (01-09-2022)Get full text
Journal Article -
10
The juridical spheres for digital forensics and electronic evidence in the insecure electronic world
Published in WIREs. Forensic science (01-09-2019)“…With so much information collected from so many places and stored in so many others, the forensic value of digital evidence has exploded globally. This ranges…”
Get full text
Journal Article -
11
Tracking and Taxonomy of Cyberlocker Link Sharers Based on Behavior Analysis
Published in The journal of digital forensics, security and law (01-01-2015)“…The growing popularity of cyberlocker service has led to significant impact on the Internet that it is considered as one of the biggest contributors to the…”
Get full text
Journal Article -
12
Sensitivity Analysis of a Bayesian Network for Reasoning about Digital Forensic Evidence
Published in 2010 3rd International Conference on Human-Centric Computing (01-08-2010)“…A Bayesian network representing an actual prosecuted case of illegal file sharing over a peer-to-peer network has been subjected to a systematic and rigorous…”
Get full text
Conference Proceeding -
13
Automatic Tagging of Cyber Threat Intelligence Unstructured Data using Semantics Extraction
Published in 2019 IEEE International Conference on Intelligence and Security Informatics (ISI) (01-07-2019)“…Threat intelligence, information about potential or current attacks to an organization, is an important component in cyber security territory. As new threats…”
Get full text
Conference Proceeding -
14
Time and Location Topic Model for analyzing Lihkg forum data
Published in 2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE) (01-05-2020)“…Open Source Intelligence (OSINT) is a choice for collecting information today for law enforcement to monitor illegal activities and allocate police resources…”
Get full text
Conference Proceeding -
15
Towards Vulnerability Types Classification Using Pure Self-Attention: A Common Weakness Enumeration Based Approach
Published in 2021 IEEE 24th International Conference on Computational Science and Engineering (CSE) (01-10-2021)“…The wake of increasing malicious cyberattack cases has aroused people's attention on cybersecurity and vulnerabilities. Common Vulnerabilities and Exposures…”
Get full text
Conference Proceeding -
16
Deep Convolutional Pooling Transformer for Deepfake Detection
Published 29-03-2023“…Recently, Deepfake has drawn considerable public attention due to security and privacy concerns in social media digital forensics. As the wildly spreading…”
Get full text
Journal Article -
17
Deepfake Detection: A Comprehensive Survey from the Reliability Perspective
Published 04-10-2024“…The mushroomed Deepfake synthetic materials circulated on the internet have raised a profound social impact on politicians, celebrities, and individuals…”
Get full text
Journal Article -
18
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics
Published in Frontiers of information technology & electronic engineering (01-10-2011)“…Verifying the integrity of a hard disk is an important concern in computer forensics, as the law enforcement party needs to confirm that the data inside the…”
Get full text
Journal Article -
19
Forensic-Aware Anti-DDoS Device
Published in 2018 IEEE Security and Privacy Workshops (SPW) (01-05-2018)“…When defending DDoS and other types of network attack, most products or service providers perform the protection by dropping the attack traffics. It cures the…”
Get full text
Conference Proceeding -
20
A Complexity Based Model for Quantifying Forensic Evidential Probabilities
Published in 2010 International Conference on Availability, Reliability and Security (01-02-2010)“…An operational complexity model (OCM) is proposed to enable the complexity of both the cognitive and the computational components of a process to be…”
Get full text
Conference Proceeding