The dynamic analysis of WannaCry ransomware DY Kao, SC Hsiao 2018 20th International conference on advanced communication technology …, 2018 | 95 | 2018 |
The static analysis of WannaCry ransomware SC Hsiao, DY Kao 2018 20th international conference on advanced communication technology …, 2018 | 77 | 2018 |
Malware image classification using one-shot learning with siamese networks SC Hsiao, DY Kao, ZY Liu, R Tso Procedia Computer Science 159, 1863-1871, 2019 | 68 | 2019 |
Drone forensic investigation: DJI spark drone as a case study DY Kao, MC Chen, WY Wu, JS Lin, CH Chen, F Tsai Procedia Computer Science 159, 1890-1899, 2019 | 48 | 2019 |
Analyzing WannaCry ransomware considering the weapons and exploits KAO Da-Yu, SC Hsiao, TSO Raylin 2019 21st International Conference on Advanced Communication Technology …, 2019 | 46 | 2019 |
Following the breadcrumbs: Timestamp pattern identification for cloud forensics SM Ho, D Kao, WY Wu Digital Investigation 24, 79-94, 2018 | 29 | 2018 |
The IP address and time in cyber‐crime investigation DY Kao, SJ Wang Policing: an international Journal of Police strategies & Management 32 (2 …, 2009 | 27 | 2009 |
Exploring drug-related crimes with social network analysis FC Tsai, MC Hsu, CT Chen, DY Kao Procedia Computer Science 159, 1907-1917, 2019 | 25 | 2019 |
Digital evidence analytics applied in cybercrime investigations DY Kao, YT Chao, F Tsai, CY Huang 2018 IEEE Conference on Application, Information and Network Security (AINS …, 2018 | 21 | 2018 |
User-side evil twin attack detection using time-delay statistics of TCP connection termination EC Kuo, MS Chang, DY Kao 2018 20th International Conference on Advanced Communication Technology …, 2018 | 20 | 2018 |
Internet forensics on the basis of evidence gathering with Peep attacks SJ Wang, DY Kao Computer Standards & Interfaces 29 (4), 423-429, 2007 | 18 | 2007 |
Detecting cyberbullying “hotspots” on Twitter: a predictive analytics approach SM Ho, D Kao, MJ Chiu-Huang, W Li, CJ Lai Forensic science international: digital investigation 32, 300906, 2020 | 15 | 2020 |
Loocipher ransomware detection using lightweight packet characteristics TM Liu, DY Kao, YY Chen Procedia Computer Science 176, 1677-1683, 2020 | 14 | 2020 |
Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments DY Kao The Journal of Supercomputing 72 (1), 141-160, 2016 | 14 | 2016 |
Drone forensic analysis using relational flight data: a case study of DJI Spark and mavic Air CC Yang, H Chuang, DY Kao Procedia Computer Science 192, 1359-1368, 2021 | 13 | 2021 |
WhatsApp network forensics: Discovering the communication payloads behind cybercriminals FC Tsai, EC Chang, DY Kao 2018 20th International Conference on Advanced Communication Technology …, 2018 | 12 | 2018 |
SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases DY Kao, SJ Wang, FFY Huang Computer Law & Security Review 26 (1), 52-60, 2010 | 12 | 2010 |
Persistence and desistance: examining the impact of re-integrative shaming to ethics in Taiwan juvenile hackers DY Kao, FFY Huang, SJ Wang Computer law & security review 25 (5), 464-476, 2009 | 12 | 2009 |
The governance of digital forensic investigation in law enforcement agencies DY Kao, NC Wu, F Tsai 2019 21st international conference on advanced communication technology …, 2019 | 10 | 2019 |
Forensic analysis of network packets from penetration test toolkits DY Kao, YS Wang, FC Tsai, CH Chen 2018 20th International Conference on Advanced Communication Technology …, 2018 | 10 | 2018 |