Skip to main content

and
Your search also matched 1 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

An Intrusion Detection Architecture for System Security

Include preview-only content
  1. Chapter and Conference Paper

    Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones

    Mobile phone use – and mobile phone piracy – have increased dramatically during the last decade. Because of the profits that can be made, more than four hundred pirated brands of mobile phones are available in...

    Junbin Fang, Zoe Jiang, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics VIII (2012)

  2. Chapter and Conference Paper

    Forensic Analysis of Popular Chinese Internet Applications

    When the Digital Evidence Search Kit (DESK) was first used in Mainland China, it was found to be inadequate because it did not support criminal investigations involving popular Internet applications such as QQ...

    Ying Yang, Kam-Pui Chow, Lucas Hui, Chunxiao Wang in Advances in Digital Forensics VI (2010)

  3. Chapter and Conference Paper

    Identifying Volatile Data from Multiple Memory Dumps in Live Forensics

    One of the core components of live forensics is to collect and analyze volatile memory data. Since the dynamic analysis of memory is not possible, most live forensic approaches focus on analyzing a single snap...

    Frank Law, Patrick Chan, Siu-Ming Yiu, Benjamin Tang in Advances in Digital Forensics VI (2010)

  4. Chapter and Conference Paper

    Improving Disk Sector Integrity Using K-Dimension Hashing

    The integrity of data stored on a hard disk is typically verified by computing the chained hash value of disk sector data in a specific order. However, this technique fails when one or more sectors turn bad du...

    Zoe Jiang, Lucas Hui, Siu-Ming Yiu in Advances in Digital Forensics IV (2008)