Liping Ding, Yifei Guo, Jian Gu, andJingzheng Wu. Proceedings of 2011 International Conference on Information andIndustrial Electronics (ICIIE 2011) of IEEE.Pp.V2-262-V2-267. Chengdu,2011,China.
Liping Ding, Gujian, Yongji Wang, andJingzheng Wu. Analysis of Telephone Call Detail Records Based on Fuzzy DecisionTree. Proceedings of ICST Conference on Forensics Applications and Techniquesin Telecommunications , Information and Multimedia. Shanghai, 2010, China.
Jingzheng Wu, Yongji Wang, Liping Ding, Xiaofeng Liao. Improving Performanceof Network Covert Timing Channel through Huffman Coding. The 2010 FTRAInternational Symposium on Advances in Cryptography, Security and Applicationsfor Future Computing (ACSA 2010). Gwangju, Korea. Dec 9-11, 2010.
Yasen Aizezi, Liping Ding, Dilixiati Maimaiti, Qiong Wan .Research on the Helper of EnCase for Digital Evidences in Uyghur-Kazak-Kyrgyz.Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree.Proceedings of ICST Conference on Forensics Applications and Techniques inTelecommunications , Information and Multimedia. Shanghai, 2010, China.
Jianchun Jiang, WeifengChen, Liping Ding. On Estimating Cyber Adversaries'Capabilities: A Bayesian Model Approach. RAID 2010: 502-504.
Yongji Wang, Jingzheng Wu,Haitao Zeng, Liping Ding, Xiaofeng Liao. Research onconvert channel, 2010,21(9):2262-2288.(in Chinese)
Ennan Zhai1, Qingni Shen1;Yonggang Wang; Tao Yang;Liping Ding; Sihan Qing; SecGuard: Secure and Practical IntegrityProtection Model for Operating Systems. Proceedings of APWeb 2011. April 18-20,2011 Beijing, China.
Ding Liping, Yang Qiusong ,Sun Liang, Tong Jie, Wang Yongji. Evaluation of the Capability of PersonalSoftware Process Based on Data Envelopment Analysis. M.Li, B.Boehm, and L.J.Osterweil(Eds.): SPW2005, LNCS3840, Springer-Verlag Bferlin Heidelberg. (2005):235 – 248 DING Liping, WANGYong-Ji. Research on relevant law and technology issues about computerforensics, Journal of Software, Vol.16, 2005(2):260-275. (in Chinese) DINGLi-Ping, ZHOU Bo-Wen, WANG Yong-Ji. Capture and Storage of Digital EvidenceBased on Security Operating System, Journal of Software,Vol.18No.7,(2007):1715-1729(in Chinese)
DING Liping, WANG Yong-Ji.Computer Forensics Survey. Journal of Communication and Computer,Vol.8,(2005):1-10(in Chinese)
Liping Ding.Computer CrimesInvestigation Need High Quality Polices. Journal of Beijing People's Police College,Vol.6,(2000):12-16(in Chinese)
Liping Ding. The Application ofInformation Mining in Computer Crimes Investitation. JOURNAL OF CHINESEPEOPLE'S PUBLIC SECURITY UNIVERSITY SCIENCE AND TECHNOLOGY,Vol.3,( 2002):47-50.(in Chinese)
Liping Ding. Study on the Risk Controlof Public Security Information Systems. JOURNAL OF CHINESE PEOPLE'S PUBLICSECURITY UNIVERSITY SCIENCE AND TECHNOLOGY,Vol.4, ( 2004):71-73 (in Chinese)Liping Ding, Zong Wang. Study on theInformation Leak through Mobile Phones and Public Security InformationAssurance. Journal of Beijing People's Police
College, Vol.4,( 2004):42-44 (in Chinese)
LipingDing.The principles and steps of computer forensics. JOURNAL OF CHINESE PEOPLE'SPUBLIC SECURITY UNIVERSITY SCIENCE AND TECHNOLOGY,Vol.1,( 2005): 71-73(in Chinese)
Liping Ding. Study on the ComputerForensics Curriculums in Public Security Schools and Colleges. Journal ofBeijing People'sPolice College, Vol.2, (2005):25-28(in Chinese)
Liping Ding, Yongji Wang. Theverification and test of computer forensics tools. CHINA INFORMATION SECURITY,Vol.8,(2005):60-63. (in Chinese)
Liping Ding. Computer ForensicsTechnologies on Network Data Stream. NETINFO SECURITY,Vol.6,( 2005):74-77(inChinese)
Liping Ding. The technological methodof computer forensics and the research on its tools. CHINA INFORMATION SECURITY,Vol.8,( 2005):32-36(in Chinese)
Liping Ding. Research onMulti-Dimension Forensics Model, NETINFO SECURITY,Vol.10,( 2005):73-75 & Network andComputer Security(tansship),Vol.11,(2005):25-27(in Chinese)