Follow
Ricci S C Ieong
Ricci S C Ieong
Adjunct Assistant Professor of Computer Science, The University of Hong Kong Science and Technology
Verified email at ust.hk
Title
Cited by
Cited by
Year
FORZA–Digital forensics investigation framework that incorporate legal issues
RSC Ieong
digital investigation 3, 29-36, 2006
2202006
Responses to transients in living and simulated neurons
M Stiber, R Ieong, JP Segundo
IEEE transactions on neural networks 8 (6), 1379-1385, 1997
181997
Deriving cse-specific live forensics investigation procedures from FORZA
R Ieong, HC Leung
Proceedings of the 2007 ACM symposium on Applied computing, 175-180, 2007
132007
Protecting digital legal professional privilege (LPP) data
FYW Law, PKY Lai, ZL Jiang, RSC Ieong, MYK Kwan, KP Chow, LCK Hui, ...
2008 Third International Workshop on Systematic Approaches to Digital …, 2008
72008
How to Balance Privilege and Digital Forensics Investigation
RSC Ieong
Third International Conference on Intelligent Information Hiding and …, 2007
72007
Identifying volatile data from multiple memory dumps in live forensics
F Law, P Chan, SM Yiu, B Tang, P Lai, KP Chow, R Ieong, M Kwan, ...
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International …, 2010
62010
Forensic investigation of peer-to-peer networks
RSC Ieong, PKY Lai, KP Chow, MYK Kwan, FYW Law
Handbook of Research on Computational Forensics, Digital Crime, and …, 2010
62010
A model for Foxy peer-to-peer network investigations
R Ieong, P Lai, KP Chow, F Law, M Kwan, K Tse
Advances in Digital Forensics V: Fifth IFIP WG 11.9 International Conference …, 2009
62009
Security analysis of the Foxy Peer-to-Peer file sharing tool
K Chow, R Ieong, M Kwan, P Lai, F Law, H Tse, K Tse
Technical Report TR-2008-09, Department of Computer Science, Hong Kong …, 2008
52008
Freeware Live Forensics tools evaluation and operation tips
R Ieong
School of Computer and Information Science, Edith Cowan University, Perth …, 2006
52006
Identifying first seeders in Foxy peer-to-peer networks
R Ieong, P Lai, KP Chow, M Kwan, F Law
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International …, 2010
42010
Memory acquisition: A 2-take approach
FYW Law, PKY Lai, KP Chow, RSC Ieong, MYK Kwan, KWH Tse, ...
Proceedings of the International Conference on Computer Science and Its …, 2009
42009
Security and privacy issues of smart card payment on Web
PCK Hung, RSC Ieong
41998
Hysteresis and asymmetric sensitivity to change in pacemaker responses to inhibitory input transients
M Stiber, R Ieong
Int. Conf. on Brain Processes, Theories and Models. WS McCulloch 25, 513-22, 1995
41995
Maintaining hard disk integrity with digital legal professional privilege (LPP) data
ZL Jiang, J Fang, FYW Law, PKY Lai, RSC Ieong, MYK Kwan, KP Chow, ...
IEEE transactions on information forensics and security 8 (5), 821-828, 2013
22013
Enchanced monitoring rule through direct node query for Foxy network investigation
RSC Ieong, KP Chow
International Conference on Digital Forensics and Investigation, ICDFI 2012, 2012
22012
Smart card payment over Internet with privacy protection
PN Chan, ST Chanson, R Ieong, J Pang
Smart Card Research and Applications: Third International Conference, CARDIS …, 2000
22000
Validation of rules used in Foxy peer-to-peer network investigations
R Ieong, KP Chow, P Lai
Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International …, 2012
12012
Long-Term Potentiation: effects on synaptic coding
R Ieong, M Stiber
Computational Neuroscience: Trends in Research, 1997, 87-92, 1997
11997
Long-term potentiation and neural coding as a single dynamical process
M Stiber, R Ieong
ICONIP’96 Special Session on Spatio-Temporal Coding in Neural Networks, 1275-80, 1996
11996
The system can't perform the operation now. Try again later.
Articles 1–20