Biblio

Filters: Author is Wan, Y.  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Gu, Y., Zhou, M., Fu, S., Wan, Y..  2015.  Airborne WiFi networks through directional antennae: An experimental study. 2015 IEEE Wireless Communications and Networking Conference, WCNC 2015.
Liu, M., Wan, Y..  2018.  Analysis of Random Mobility Model with Sense and Avoid Protocols for UAV Traffic Management. to appear in Proceedings of AIAA SciTech Conference.
C
D
Li, S., Wan, Y., Fu, S., Liu, M., Wu, H.F..  2017.  Design and implementation of a remote UAV-based mobile health monitoring system. Proceedings of SPIE - The International Society for Optical Engineering. 10169
E
Talasila, M., Fu, S., Wan, Y..  2015.  Energy conservative distributed average consensus through connected dominating set. 2015 IEEE Wireless Communications and Networking Conference, WCNC 2015.
F
H
L
P
R
S
T
Huang, M. Chiu, Wan, Y., Chiang, C., Wang, S..  2018.  Tor Browser Forensics in Exploring Invisible Evidence. 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). :3909-3914.
Given the high frequency of information security incidents, feeling that we may soon become innocent victims of these events may be justified. Perpetrators of information security offenses take advantage of several methods to leave no evidence of their crimes, and this pattern of hiding tracks has caused difficulties for investigators searching for digital evidence. Use of the onion router (Tor) is a common way for criminals to conceal their identities and tracks. This paper aims to explain the composition and operation of onion routing; we conduct a forensic experiment to detect the use of the Tor browser and compare several browser modes, including incognito and normal. Through the experimental method described in this paper, investigators can learn to identify perpetrators of Internet crimes, which will be helpful in future endeavors in digital forensics.
U