Da‐Yu Kao

571 total citations
46 papers, 350 citations indexed

About

Da‐Yu Kao is a scholar working on Information Systems, Signal Processing and Computer Networks and Communications. According to data from OpenAlex, Da‐Yu Kao has authored 46 papers receiving a total of 350 indexed citations (citations by other indexed papers that have themselves been cited), including 35 papers in Information Systems, 31 papers in Signal Processing and 17 papers in Computer Networks and Communications. Recurrent topics in Da‐Yu Kao's work include Advanced Malware Detection Techniques (31 papers), Digital and Cyber Forensics (25 papers) and Network Security and Intrusion Detection (16 papers). Da‐Yu Kao is often cited by papers focused on Advanced Malware Detection Techniques (31 papers), Digital and Cyber Forensics (25 papers) and Network Security and Intrusion Detection (16 papers). Da‐Yu Kao collaborates with scholars based in Taiwan, India and United States. Da‐Yu Kao's co-authors include Raylin Tso, Ziyuan Liu, Shiuh-Jeng Wang, Chien‐Hung Chen, Shuyuan Mary Ho, Jsen‐Shung Lin, Aneesh Sharma and Chien‐Ming Chen and has published in prestigious journals such as Journal of the Association for Information Systems, Applied Sciences and Journal of Intelligent & Fuzzy Systems.

In The Last Decade

Da‐Yu Kao

40 papers receiving 315 citations

Peers

Da‐Yu Kao
Guozi Sun China
Huiming Yu United States
Yao Cheng China
Qiang Zhu United States
Peilong Li United States
Guozi Sun China
Da‐Yu Kao
Citations per year, relative to Da‐Yu Kao Da‐Yu Kao (= 1×) peers Guozi Sun

Countries citing papers authored by Da‐Yu Kao

Since Specialization
Citations

This map shows the geographic impact of Da‐Yu Kao's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Da‐Yu Kao with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Da‐Yu Kao more than expected).

Fields of papers citing papers by Da‐Yu Kao

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Da‐Yu Kao. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Da‐Yu Kao. The network helps show where Da‐Yu Kao may publish in the future.

Co-authorship network of co-authors of Da‐Yu Kao

This figure shows the co-authorship network connecting the top 25 collaborators of Da‐Yu Kao. A scholar is included among the top collaborators of Da‐Yu Kao based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Da‐Yu Kao. Da‐Yu Kao is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
2.
Kao, Da‐Yu, et al.. (2020). Hacking Tool Identification in Penetration Testing. 256–261. 1 indexed citations
3.
Kao, Da‐Yu, et al.. (2019). Malware Image Classification Using One-Shot Learning with Siamese Networks. Procedia Computer Science. 159. 1863–1871. 47 indexed citations
4.
Kao, Da‐Yu, et al.. (2019). Drone Forensic Investigation: DJI Spark Drone as A Case Study. Procedia Computer Science. 159. 1890–1899. 32 indexed citations
5.
Kao, Da‐Yu, et al.. (2018). The static analysis of WannaCry ransomware. 2018 20th International Conference on Advanced Communication Technology (ICACT). 153–158. 24 indexed citations
6.
Kao, Da‐Yu, et al.. (2018). The dynamic analysis of WannaCry ransomware. 2018 20th International Conference on Advanced Communication Technology (ICACT). 10 indexed citations
7.
Kao, Da‐Yu, et al.. (2018). Forensic analysis of network packets from penetration test toolkits. 2018 20th International Conference on Advanced Communication Technology (ICACT). 363–368.
8.
Kao, Da‐Yu, et al.. (2018). Forensic analysis of network packets from penetration test toolkits. 2018 20th International Conference on Advanced Communication Technology (ICACT). 1–1. 2 indexed citations
9.
Kao, Da‐Yu, et al.. (2018). Reconstructing ADS data hiding in windows NTFS: A temporal analysis. Digital Investigation. 26. S137–S137. 1 indexed citations
10.
Kao, Da‐Yu, et al.. (2018). WhatsApp network forensics: Discovering the communication payloads behind cybercriminals. 2018 20th International Conference on Advanced Communication Technology (ICACT). 1–1. 2 indexed citations
11.
Kao, Da‐Yu, et al.. (2018). The dynamic analysis of WannaCry ransomware. 2018 20th International Conference on Advanced Communication Technology (ICACT). 159–166. 24 indexed citations
12.
Kao, Da‐Yu, et al.. (2018). User-side evil twin attack detection using time-delay statistics of TCP connection termination. 2018 20th International Conference on Advanced Communication Technology (ICACT). 1–1. 14 indexed citations
13.
Kao, Da‐Yu. (2015). Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments. The Journal of Supercomputing. 72(1). 141–160. 4 indexed citations
15.
Kao, Da‐Yu, et al.. (2010). SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases. Computer law & security review. 26(1). 52–60. 7 indexed citations
16.
Kao, Da‐Yu, et al.. (2009). The IP address and time in cyber‐crime investigation. Policing An International Journal. 32(2). 194–208. 7 indexed citations
17.
Kao, Da‐Yu, et al.. (2009). A Case-Oriented Model of Digital Forensics on Infected Zombie Computers. 2. 1–6. 1 indexed citations
18.
Kao, Da‐Yu, et al.. (2009). Persistence and desistance: Examining the impact of re-integrative shaming to ethics in Taiwan juvenile hackers. Computer law & security review. 25(5). 464–476. 7 indexed citations
19.
Wang, Shiuh-Jeng, et al.. (2008). Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models. Computer Standards & Interfaces. 31(4). 795–800. 4 indexed citations
20.
Wang, Shiuh-Jeng & Da‐Yu Kao. (2006). Internet forensics on the basis of evidence gathering with Peep attacks. Computer Standards & Interfaces. 29(4). 423–429. 7 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026