Evidence of advanced persistent threat: A case study of malware for political espionage F Li, A Lai, D Ddl 2011 6th International Conference on Malicious and Unwanted Software, 102-109, 2011 | 131 | 2011 |
Facebook forensics K Wong, ACT Lai, JCK Yeung, WL Lee, PH Chan valkyrie-x security research group, 2011 | 28 | 2011 |
RansomSOC: A More Effective Security Operations Center to Detect and Respond to Ransomware Attacks. ACT Lai, PF Ke, K Chan, SM Yiu, D Kim, WK Wong, S Wang, J Muppala, ... J. Internet Serv. Inf. Secur. 12 (3), 63-75, 2022 | 2 | 2022 |
Backdoor Investigation and Incident Response: From Zero to Profit ACT Lai, KWK Wong, APL Ho, ZPF Ke Blackhat Asia 2022, 2022 | 2 | 2022 |
A study of online service and information exposure of public companies SH Kwok, ACT Lai, JCK Yeung Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence …, 2009 | 2 | 2009 |
Backdoor Investigation and Incident Response: From Zero to Profit SWJM Anthony, Cheuk Tung, Lai , Ken, Wai Kin, Wong, Johnny, Tsz Wun, Wong ... Lecture Notes of the Institute for Computer Sciences, Social Informatics and …, 2022 | | 2022 |
RansomSOC: A More Effective Security Operations Center to Detect and Respond to Ransomware Attacks JISIS, 2022 | | 2022 |
Facebook Forensics MPHC Mr. Kelvin Wong, Mr. Anthony C. T. Lai, Mr. Jason Hakin9 Magazine, 2011 | | 2011 |
Comprehensive Blended Malware Threat Dissection Analyze Fake Anti-Virus Software and PDF Payloads A Lai SANS Reading Room, 2010 | | 2010 |