FORZA¡VDigital forensics investigation framework that incorporate legal issues RSC Ieong digital investigation 3, 29-36, 2006 | 228 | 2006 |
Responses to transients in living and simulated neurons M Stiber, R Ieong, JP Segundo IEEE transactions on neural networks 8 (6), 1379-1385, 1997 | 18 | 1997 |
Deriving cse-specific live forensics investigation procedures from FORZA R Ieong, HC Leung Proceedings of the 2007 ACM symposium on Applied computing, 175-180, 2007 | 14 | 2007 |
Protecting digital legal professional privilege (LPP) data FYW Law, PKY Lai, ZL Jiang, RSC Ieong, MYK Kwan, KP Chow, LCK Hui, ... 2008 Third International Workshop on Systematic Approaches to Digital ¡K, 2008 | 7 | 2008 |
How to Balance Privilege and Digital Forensics Investigation RSC Ieong Third International Conference on Intelligent Information Hiding and ¡K, 2007 | 7 | 2007 |
Identifying volatile data from multiple memory dumps in live forensics F Law, P Chan, SM Yiu, B Tang, P Lai, KP Chow, R Ieong, M Kwan, ... Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International ¡K, 2010 | 6 | 2010 |
Forensic investigation of peer-to-peer networks RSC Ieong, PKY Lai, KP Chow, MYK Kwan, FYW Law Handbook of Research on Computational Forensics, Digital Crime, and ¡K, 2010 | 6 | 2010 |
A model for Foxy peer-to-peer network investigations R Ieong, P Lai, KP Chow, F Law, M Kwan, K Tse Advances in Digital Forensics V: Fifth IFIP WG 11.9 International Conference ¡K, 2009 | 6 | 2009 |
Security analysis of the Foxy Peer-to-Peer file sharing tool K Chow, R Ieong, M Kwan, P Lai, F Law, H Tse, K Tse Technical Report TR-2008-09, Department of Computer Science, Hong Kong ¡K, 2008 | 5 | 2008 |
Freeware Live Forensics tools evaluation and operation tips R Ieong School of Computer and Information Science, Edith Cowan University, Perth ¡K, 2006 | 5 | 2006 |
Memory acquisition: A 2-take approach FYW Law, PKY Lai, KP Chow, RSC Ieong, MYK Kwan, KWH Tse, ... Proceedings of the International Conference on Computer Science and Its ¡K, 2009 | 4 | 2009 |
Security and privacy issues of smart card payment on Web PCK Hung, RSC Ieong | 4 | 1998 |
Hysteresis and asymmetric sensitivity to change in pacemaker responses to inhibitory input transients M Stiber, R Ieong Int. Conf. on Brain Processes, Theories and Models. WS McCulloch 25, 513-22, 1995 | 4 | 1995 |
Maintaining hard disk integrity with digital legal professional privilege (LPP) data ZL Jiang, J Fang, FYW Law, PKY Lai, RSC Ieong, MYK Kwan, KP Chow, ... IEEE transactions on information forensics and security 8 (5), 821-828, 2013 | 3 | 2013 |
Identifying first seeders in Foxy peer-to-peer networks R Ieong, P Lai, KP Chow, M Kwan, F Law Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International ¡K, 2010 | 3 | 2010 |
Enchanced monitoring rule through direct node query for Foxy network investigation RSC Ieong, KP Chow International Conference on Digital Forensics and Investigation, ICDFI 2012, 2012 | 2 | 2012 |
Smart card payment over Internet with privacy protection PN Chan, ST Chanson, R Ieong, J Pang Smart Card Research and Applications: Third International Conference, CARDIS ¡K, 2000 | 2 | 2000 |
Validation of rules used in Foxy peer-to-peer network investigations R Ieong, KP Chow, P Lai Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International ¡K, 2012 | 1 | 2012 |
Long-Term Potentiation: effects on synaptic coding R Ieong, M Stiber Computational Neuroscience: Trends in Research, 1997, 87-92, 1997 | 1 | 1997 |
Long-term potentiation and neural coding as a single dynamical process M Stiber, R Ieong ICONIP¡¦96 Special Session on Spatio-Temporal Coding in Neural Networks, 1275-80, 1996 | 1 | 1996 |