EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: person:"Chow, KP"
Narrow search

Narrow search

Year of publication
Subject
All
Bayesian posterior probabilities 1 Dark Web 1 Data Mining 1 Digital forensics 1 Digitalisierung 1 Digitization 1 E-commerce 1 Electronic Commerce 1 Evidential probability 1 Odds 1 Operational complexity model 1 Search theory 1 Suchtheorie 1 TOR 1 Threat Intelligence 1
more ... less ...
Online availability
All
Free 3 Undetermined 1
Type of publication
All
Article 2 Book / Working Paper 2
Type of publication (narrower categories)
All
Congress Report 1
Language
All
English 4
Author
All
Chan, H. W. 2 Chong, C.F. 2 Chow, K.P. 2 Chow, KP 2 Pun, K.H. 2 Tsang, W. W. 2 Chow, Sherman S.M. 1 Hui, CK 1 Hui, L.C.K. 1 Lai, K.Y. 1 Overill, RE 1 Silomon, JAM 1 Sui, Ai-fen 1 Yiu, S.M. 1 Zhang, Xuan 1
more ... less ...
Published in...
All
International Journal of Digital Crime and Forensics (IJDCF) 1
Source
All
ECONIS (ZBW) 2 BASE 1 Other ZBW resources 1
Showing 1 - 4 of 4
Cover Image
Digital Evidence Search Kit
Chow, K.P. - 2015
With the rapid development of electronic commerce and Internet technology, cyber crimeshave become more and more common. There is a great need for automated software systemsthat can assist law enforcement agencies in cyber crime evidence collection. This paperdescribes a cyber crime evidence...
Persistent link: https://www.econbiz.de/10013037962
Saved in:
Cover Image
A Framework for Dark Web Threat Intelligence Analysis
Zhang, Xuan; Chow, KP - In: International Journal of Digital Crime and Forensics (IJDCF) 10 (2018) 4, pp. 108-117
This article describes how the Dark Web is usually considered the dark side of the World Wide Web. Cyber criminals usually use specialized tools, e.g. TOR, to access the hidden services inside the Dark Web anonymously. Law enforcement officers have difficulty tracing the identity of these cyber...
Persistent link: https://www.econbiz.de/10012043987
Saved in:
Cover Image
Separable and Anonymous Identity-Based Key Issuing
Sui, Ai-fen - 2011
In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is responsible for computing and sending the private keys to users and therefore, a secure channel is required. For privacy-oriented...
Persistent link: https://www.econbiz.de/10013124803
Saved in:
Cover Image
A complexity based model for quantifying forensic evidential probabilities
Overill, RE; Silomon, JAM; Chow, KP - 2010
An operational complexity model (OCM) is proposed to enable the complexity of both the cognitive and the computational components of a process to be determined. From the complexity of formation of a set of traces via a specified route a measure of the probability of that route can be determined....
Persistent link: https://www.econbiz.de/10009471480
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...