学术刊物
博士论文
- 刑事法庭案件证据的贝叶斯网络分析(只有英文版)
- 单击此处进入大学图书馆网站。
第一作者刊物
- The Next Generation for the Forensic Extraction of Electronic Evidence from Mobile Telephones
- Authors: Hayson Tse, K.P. Chow, M. Kwan.
- In Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering. 2013, pages 1 - 7.
- doi: 10.1109/SADFE.2013.6911548
- Click here for pdf
- A Generic Bayesian Belief Model for Similar Cyber Crimes
- Authors: Hayson Tse, K.P. Chow, M. Kwan.
- Advances in Digital Forensics IX. 2013, Vol. 410, pages 243 - 255.
- doi: 10.1007/978-3-642-41148-9_17
- Click here for pdf
- Software pirates: a criminal investigation
- Authors: Hayson Tse, K.P. Chow, Pierre Lai.
- In 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation. 2012, pages 1 - 10.
- doi: 10.1109/SADFE.2013.6911547
- Click here for pdf
- Reasoning about Evidence using Bayesian Networks
- Authors: Hayson Tse, K.P. Chow, M. Kwan.
- Advances in Digital Forensics VIII. 2012, Vol. 383, pages 99 - 113.
- doi: 10.1007/978-3-642-33962-2_7
- Click here for pdf
- Hong Kong Public Prosecutors Face the Challenges of Technology Crimes
- Author: Hayson Tse.
- China Law. 2010, January, pages 80 - 86.
- Click here for pdf
其它刊物
- Effects of motivation and demography on the quantitative plausibility of the trojan horse defence against possession of child pornography
- Authors: R Overill, J Silomon, KP Chow, Hayson Tse.
- Journal of Harbin Institute of Technology. 2014, Vol. 21, No. 6, Pages 9 - 15.
- Click here for pdf.
- A Bayesian belief network for data leakage investigation
- Authors: F Xu, M Kwan, Hayson Tse, KP Chow.
- In Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, pages 19 - 24.
- doi: 10.1145/2598918.2598919
- Click here for pdf.
- Quantification of digital forensic hypotheses using probability theory
- Authors: R Overill, J Silomon, KP Chow, Hayson Tse.
- In 2013 IEEE Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering
- doi: 10.1109/SADFE.2013.6911547
- Click here for pdf.
- Digital Child Pornography: Offender or not Offender
- Authors: F Law, KP Chow, P Lai, Hayson Tse, K Tse.
- Technology for Facilitating Humanity and Combating Social Deviations: Interdisciplinary Perspectives. 2011, Pages 1 - 17.
- doi: 10.4018/978-1-60960-094-5.ch001
- Click here for pdf.
- Protecting Digital Data Privacy in Computer Forensic Examination
- Authors: F Law, P Chan, SM Yiu, KP Chow, M Kwan, Hayson Tse, P Lai.
- In 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering. Pages 1 - 6.
- doi: 10.1109/SADFE.2011.15
- Click here for pdf.
- Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations
- Authors: M Kwan, R Overill, KP Chow, Hayson Tse, F Law, P Lai.
- Advances in Digital Forensics VII. 2011, Vol. 361, pages 231 - 243.
- doi: 10.1007/978-3-642-24212-0_18
- Click here for pdf.
- Evaluation of Evidence in Internet Auction Fraud Investigations
- Authors: M Kwan, R Overill, KP Chow, J Silomon, Hayson Tse, F Law, P Lai.
- Advances in Digital Forensics VI. 2010, Vol. 337, pages 121 - 132.
- doi: 10.1007/978-3-642-15506-2_9
- Click here for pdf.
- Analyzing Storage Media of Digital Camera
- Authors: K Tse, KP Chow, F Law, R Ieong, M Kwan, Hayson Tse, P Lai.
- In 2nd International Workshop on Forensics for Future Generation Communication environments. Pages 19 - 24.
- doi: 10.1109/CSA.2009.5404201
- Click here for pdf.
- Forensic Investigation of Peer to Peer Networks
- Authors: R Ieong, P Lai, KP Chow, M Kwan, F Law, Hayson Tse, K Tse.
- Handbook of Research on Computational Forensics, Digital Crime and Investigation. Pages 355 - 378.
- doi: 10.1016/j.diin.2010.05.012
- Click here for pdf.
- Memory Acquisition: A 2-Take Approach
- Authors: F Law, P Lai, KP Chow, R Ieong, M Kwan, K Tse, Hayson Tse.
- In 2009 International Conference on Computer Science and its Applications.
- doi: 10.1109/CSA.2009.5404199
- Click here for pdf.
- A Host-Based Approach to BotNet Investigation
- Authors: F Law, KP Chow, P Lai, Hayson Tse.
- Digital Forensics and Cyber Crime. 2009, Vol. 31, pages 161 - 170.
- doi: 10.1007/978-3-642-11534-9_16
- Click here for pdf.
- Analysis of the Digital Evidence Presented in the Yahoo Case
- Authors: M Kwan, KP Chow, P Lai, F Law, Hayson Tse.
- Advances in Digital Forensics VI. 2009, Vol. 306, pages 241 - 252.
- doi: 10.1007/978-3-642-04155-6_18
- Click here for pdf.
- Security Analysis of the Foxy Peer-to-Peer File Sharing Tool
- Authors: KP Chow, R Ieong, M Kwan, P Lai, F Law, Hayson Tse, K Tse.
- Tech Report TR-2008-09
- Click here for pdf.
讲座和讲习班
- The One There, Where the Lamplight was Fading
- Date: July 10, 2017, Monday.
- Event: Talk to students of MSc in Electronic Security and Digital Forensics regarding Final Year Project.
- Location: The School of Professional and Continuing Education, The University of Hong Kong, Pokfulam, Hong Kong Special Administrative Region, People’s Republic of China.
- The Year of Injunctive Relief
- The Good, the Bad and the Weird
- Date: November 26, 2014, Wednesday.
- Event: Lecture for CCST9029 Scientific and Technology Literacy.
- Location: The University of Hong Kong, Pokfulam, Hong Kong Special Administrative Region, People’s Republic of China.
- click here.
- Innovation and Strategies to Combat Online Piracy and Counterfeiting – a Look at the Hong Kong Experience
- Date: November 9, 2014, Sunday.
- Event: INTERPOL 4th Regional Intellectual Property (IP) Crime Conference in the Middle East and North Africa.
- Location: Dubai, United Arab Emirates.
- click here for video.
- Relationship between Private Entities and Public Prosecutors in the Investigation of IP Crime: Approaches, Limits and Obligations
- Structured Analytic Techniques
- Date: July 9, 2014, Wednesday
- Event: INTERPOL Trafficking in Illicit Goods & Counterfeiting Pre-operation Planning and Capacity Building.
- Location: Shanghai Police College, Shanghai, People’s Republic of China.
- Losing the War against Cybercirme, whilst Winning some Battles. Whose side are you on?
- Date: November 27, 2013, Wednesday.
- Event: Lecture for CCST9029 Scientific and Technology Literacy.
- Location: The University of Hong Kong, Pokfulam, Hong Kong Special Administrative Region, People’s Republic of China.
- click here.
- High Tech Crimes: Old Crimes New Tools, New Crimes New Tools
- Date: August 31, 2011, Wednesday.
- Seminar by Lex Omnibus.
- Location: Room 502, 5/F, 1 Duddell Street, Central, Hong Kong Special Administrative Region, People’s Republic of China.
教学工作
- 2021, 2023
- Refresher Course for Teacher-librarians: Copyright & School Libraries (Primary & Secondary)
- 2008 - 2019,1 2022 - 2023
- Postgraduate Diploma in Information Technology Forensics program, held at The School of Professional and Continuing Education, The University of Hong Kong, Pokfulam:
- e-Business Related Legislations and Cyber Crimes (30 credits); and
- Collecting Digital Evidence and Presentation in Court (30 credits).
1 Between 2019 and 2022 stopped teaching and went to study Acupuncture-Moxibustion for 3 years.
- 2016 - 2020
Middlesex University London’s MSc Electronic Security and Digital Forensics program (collaborated with The School of Professional and Continuing Education, The University of Hong Kong, Pokfulam):
- BIS 4630 Corporate Compliance & Fraud Analytic (30 credits); and
- BIS 4992 Postgraduate Computing Project (60 credits).