It looks like you're offline.
Open Library logo
additional options menu
Last edited by ImportBot
September 27, 2008 | History

Kim-Kwang Raymond Choo

We need a photo of Kim-Kwang Raymond Choo

37 works Add another?

Showing all works by author. Would you like to see only ebooks?

  • Cover of: Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics , Volume 1

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Advanced Multimedia and Ubiquitous Engineering: MUE-FutureTech 2020

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Green, Pervasive, and Cloud Computing: 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Ubiquitous Security: First Inernational Conference , UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Practical Hands-On Approach to Database Forensics

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Handbook of Big Data Analytics and Forensics

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Handbook of Big Data Privacy

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Online child grooming: a literature review on the misuse of social networking sites for grooming children for sexual offences

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Blockchain Cybersecurity, Trust and Privacy

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Data Science in Cybersecurity and Cyberthreat Intelligence

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Digital Forensic Education: An Experiential Learning Approach

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Security and Privacy in Communication Networks: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23–25, 2019, ... and Telecommunications Engineering )

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Blockchains for Network Security: Principles, Technologies, and Applications

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Big Digital Forensic Data : Volume 1: Data Reduction Framework and Selective Imaging

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cyber and Digital Forensic Investigations: A Law Enforcement Practitioner's Perspective

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: 2020 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: National Cyber Summit (NCS) Research Track 2021

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: International Conference on Emerging Applications and Technologies for Industry 4. 0: Emerging Applications and Technologies for Industry 4. 0

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Secure Key Establishment

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today

History

Download catalog record: RDF / JSON
September 27, 2008 Created by ImportBot Imported from Library of Congress MARC record