学术刊物

博士论文

  • 刑事法庭案件证据的贝叶斯网络分析(只有英文版)
    • 单击此处进入大学图书馆网站。

第一作者刊物

  • The Next Generation for the Forensic Extraction of Electronic Evidence from Mobile Telephones
    • Authors: Hayson Tse, K.P. Chow, M. Kwan.
    • In Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering. 2013, pages 1 - 7.
    • doi: 10.1109/SADFE.2013.6911548
    • Click here for pdf
  • A Generic Bayesian Belief Model for Similar Cyber Crimes
    • Authors: Hayson Tse, K.P. Chow, M. Kwan.
    • Advances in Digital Forensics IX. 2013, Vol. 410, pages 243 - 255.
    • doi: 10.1007/978-3-642-41148-9_17
    • Click here for pdf
  • Software pirates: a criminal investigation
    • Authors: Hayson Tse, K.P. Chow, Pierre Lai.
    • In 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation. 2012, pages 1 - 10.
    • doi: 10.1109/SADFE.2013.6911547
    • Click here for pdf
  • Reasoning about Evidence using Bayesian Networks
    • Authors: Hayson Tse, K.P. Chow, M. Kwan.
    • Advances in Digital Forensics VIII. 2012, Vol. 383, pages 99 - 113.
    • doi: 10.1007/978-3-642-33962-2_7
    • Click here for pdf
  • Hong Kong Public Prosecutors Face the Challenges of Technology Crimes
    • Author: Hayson Tse.
    • China Law. 2010, January, pages 80 - 86.
    • Click here for pdf

其它刊物

  • Effects of motivation and demography on the quantitative plausibility of the trojan horse defence against possession of child pornography
    • Authors: R Overill, J Silomon, KP Chow, Hayson Tse.
    • Journal of Harbin Institute of Technology. 2014, Vol. 21, No. 6, Pages 9 - 15.
    • Click here for pdf.
  • A Bayesian belief network for data leakage investigation
    • Authors: F Xu, M Kwan, Hayson Tse, KP Chow.
    • In Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, pages 19 - 24.
    • doi: 10.1145/2598918.2598919
    • Click here for pdf.
  • Quantification of digital forensic hypotheses using probability theory
    • Authors: R Overill, J Silomon, KP Chow, Hayson Tse.
    • In 2013 IEEE Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering
    • doi: 10.1109/SADFE.2013.6911547
    • Click here for pdf.
  • Digital Child Pornography: Offender or not Offender
    • Authors: F Law, KP Chow, P Lai, Hayson Tse, K Tse.
    • Technology for Facilitating Humanity and Combating Social Deviations: Interdisciplinary Perspectives. 2011, Pages 1 - 17.
    • doi: 10.4018/978-1-60960-094-5.ch001
    • Click here for pdf.
  • Protecting Digital Data Privacy in Computer Forensic Examination
    • Authors: F Law, P Chan, SM Yiu, KP Chow, M Kwan, Hayson Tse, P Lai.
    • In 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering. Pages 1 - 6.
    • doi: 10.1109/SADFE.2011.15
    • Click here for pdf.
  • Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations
    • Authors: M Kwan, R Overill, KP Chow, Hayson Tse, F Law, P Lai.
    • Advances in Digital Forensics VII. 2011, Vol. 361, pages 231 - 243.
    • doi: 10.1007/978-3-642-24212-0_18
    • Click here for pdf.
  • Evaluation of Evidence in Internet Auction Fraud Investigations
    • Authors: M Kwan, R Overill, KP Chow, J Silomon, Hayson Tse, F Law, P Lai.
    • Advances in Digital Forensics VI. 2010, Vol. 337, pages 121 - 132.
    • doi: 10.1007/978-3-642-15506-2_9
    • Click here for pdf.
  • Analyzing Storage Media of Digital Camera
    • Authors: K Tse, KP Chow, F Law, R Ieong, M Kwan, Hayson Tse, P Lai.
    • In 2nd International Workshop on Forensics for Future Generation Communication environments. Pages 19 - 24.
    • doi: 10.1109/CSA.2009.5404201
    • Click here for pdf.
  • Forensic Investigation of Peer to Peer Networks
    • Authors: R Ieong, P Lai, KP Chow, M Kwan, F Law, Hayson Tse, K Tse.
    • Handbook of Research on Computational Forensics, Digital Crime and Investigation. Pages 355 - 378.
    • doi: 10.1016/j.diin.2010.05.012
    • Click here for pdf.
  • Memory Acquisition: A 2-Take Approach
    • Authors: F Law, P Lai, KP Chow, R Ieong, M Kwan, K Tse, Hayson Tse.
    • In 2009 International Conference on Computer Science and its Applications.
    • doi: 10.1109/CSA.2009.5404199
    • Click here for pdf.
  • A Host-Based Approach to BotNet Investigation
    • Authors: F Law, KP Chow, P Lai, Hayson Tse.
    • Digital Forensics and Cyber Crime. 2009, Vol. 31, pages 161 - 170.
    • doi: 10.1007/978-3-642-11534-9_16
    • Click here for pdf.
  • Analysis of the Digital Evidence Presented in the Yahoo Case
    • Authors: M Kwan, KP Chow, P Lai, F Law, Hayson Tse.
    • Advances in Digital Forensics VI. 2009, Vol. 306, pages 241 - 252.
    • doi: 10.1007/978-3-642-04155-6_18
    • Click here for pdf.
  • Security Analysis of the Foxy Peer-to-Peer File Sharing Tool
    • Authors: KP Chow, R Ieong, M Kwan, P Lai, F Law, Hayson Tse, K Tse.
    • Tech Report TR-2008-09
    • Click here for pdf.

讲座和讲习班

  • The One There, Where the Lamplight was Fading
    • Date: July 10, 2017, Monday.
    • Event: Talk to students of MSc in Electronic Security and Digital Forensics regarding Final Year Project.
    • Location: The School of Professional and Continuing Education, The University of Hong Kong, Pokfulam, Hong Kong Special Administrative Region, People’s Republic of China.
  • The Year of Injunctive Relief
    • Date: 18 September 2015.
    • Event: 2015 Internet Service Providers Symposium on Net Neutrality and Site Blocking.
    • Location: Hyatt Place, Shenzhen, People’s Republic of China.
    • click here for conclusion.
    • click here for photographs.
  • The Good, the Bad and the Weird
    • Date: November 26, 2014, Wednesday.
    • Event: Lecture for CCST9029 Scientific and Technology Literacy.
    • Location: The University of Hong Kong, Pokfulam, Hong Kong Special Administrative Region, People’s Republic of China.
    • click here.
  • Innovation and Strategies to Combat Online Piracy and Counterfeiting – a Look at the Hong Kong Experience
    • Date: November 9, 2014, Sunday.
    • Event: INTERPOL 4th Regional Intellectual Property (IP) Crime Conference in the Middle East and North Africa.
    • Location: Dubai, United Arab Emirates.
    • click here for video.
  • Relationship between Private Entities and Public Prosecutors in the Investigation of IP Crime: Approaches, Limits and Obligations
    • Date: September 23, 2014, Tuesday.
    • Event: INTERPOL International Law Enforcement IP Crime Conference.
    • Location: Hanoi, Socialist Republic of Vietnam.
    • click here for video.
    • click here for pdf.
  • Structured Analytic Techniques
    • Date: July 9, 2014, Wednesday
    • Event: INTERPOL Trafficking in Illicit Goods & Counterfeiting Pre-operation Planning and Capacity Building.
    • Location: Shanghai Police College, Shanghai, People’s Republic of China.
  • Losing the War against Cybercirme, whilst Winning some Battles. Whose side are you on?
    • Date: November 27, 2013, Wednesday.
    • Event: Lecture for CCST9029 Scientific and Technology Literacy.
    • Location: The University of Hong Kong, Pokfulam, Hong Kong Special Administrative Region, People’s Republic of China.
    • click here.
  • High Tech Crimes: Old Crimes New Tools, New Crimes New Tools
    • Date: August 31, 2011, Wednesday.
    • Seminar by Lex Omnibus.
    • Location: Room 502, 5/F, 1 Duddell Street, Central, Hong Kong Special Administrative Region, People’s Republic of China.

教学工作

  1. 2021, 2023
  • Refresher Course for Teacher-librarians: Copyright & School Libraries (Primary & Secondary)
  1. 2008 - 2019,1 2022 - 2023
  • Postgraduate Diploma in Information Technology Forensics program, held at The School of Professional and Continuing Education, The University of Hong Kong, Pokfulam:
    • e-Business Related Legislations and Cyber Crimes (30 credits); and
    • Collecting Digital Evidence and Presentation in Court (30 credits).

1 Between 2019 and 2022 stopped teaching and went to study Acupuncture-Moxibustion for 3 years.

  1. 2016 - 2020
  • Middlesex University London’s MSc Electronic Security and Digital Forensics program (collaborated with The School of Professional and Continuing Education, The University of Hong Kong, Pokfulam):

    • BIS 4630 Corporate Compliance & Fraud Analytic (30 credits); and
    • BIS 4992 Postgraduate Computing Project (60 credits).