咨询与建议

限定检索结果

文献类型

  • 10 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 9 篇 计算机科学与技术...
    • 6 篇 网络空间安全
    • 3 篇 软件工程
    • 2 篇 公安技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 航空宇航科学与技...
  • 2 篇 法学
    • 2 篇 公安学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学

主题

  • 11 篇 computer forensi...
  • 3 篇 digital evidence
  • 3 篇 cloud computing
  • 1 篇 cybercrimes
  • 1 篇 eucalyptus
  • 1 篇 c4.5
  • 1 篇 hadoop file syst...
  • 1 篇 live forensics
  • 1 篇 overlay network
  • 1 篇 anti-phishing
  • 1 篇 decision tree
  • 1 篇 anti-botnet
  • 1 篇 mac os x operati...
  • 1 篇 face recognition
  • 1 篇 cybercrime
  • 1 篇 electronic evide...
  • 1 篇 hard disk integr...
  • 1 篇 computer crime
  • 1 篇 amazon web servi...
  • 1 篇 collaborative ne...

机构

  • 2 篇 key laboratory o...
  • 1 篇 department of co...
  • 1 篇 center for infor...
  • 1 篇 department of au...
  • 1 篇 research institu...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 east china unive...
  • 1 篇 dept.of informat...
  • 1 篇 shandong provinc...
  • 1 篇 shandong provinc...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of as...

作者

  • 1 篇 junwei cao
  • 1 篇 lian-hai wang
  • 1 篇 yi wang
  • 1 篇 lucas chi kwong ...
  • 1 篇 fuye han
  • 1 篇 k.p.chow
  • 1 篇 aqil burney
  • 1 篇 zoe lin jiang
  • 1 篇 zhen chen
  • 1 篇 frank y.w.law
  • 1 篇 kam pui chow
  • 1 篇 siu ming yiu
  • 1 篇 xin jiang
  • 1 篇 wang yi
  • 1 篇 shuo chen
  • 1 篇 guo hong jin bo ...
  • 1 篇 zain abbas
  • 1 篇 zhang ying
  • 1 篇 muhammad asif
  • 1 篇 wang lianhai xu ...

语言

  • 7 篇 英文
  • 4 篇 中文
检索条件"主题词=computer forensics"
11 条 记 录,以下是1-10 订阅
排序:
computer forensics Under Cloud Computing Environment
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2014年 第6期21卷 34-38页
作者: Yi Wang Dept.of Information Science and Technology East China University of Political Science and Law
Cloud computing is becoming the developing trend in the information *** causes many transforms in the related *** order to adapt such changes,computer forensics is bound to improve and integrate into the new *** paper... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
computer forensics-An Essential Element of Modern IT Security
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2014年 第6期21卷 5-8页
作者: Frank Y.W.Law K.P.Chow Center for Information Security and Cryptography University of Hong Kong
computer forensics is the science of obtaining,preserving,and documenting evidence from computers,mobile devices as well as other digital electronic storage *** must be done in a manner designed to preserve the probat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics
收藏 引用
Journal of Zhejiang University-Science C(computers and Electronics) 2011年 第10期12卷 809-818页
作者: Zoe Lin JIANG Lucas Chi Kwong HUI Siu Ming YIU Kam Pui CHOW School of computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School Department of computer Science The University of Hong Kong
Verifying the integrity of a hard disk is an important concern in computer forensics,as the law enforcement party needs to confirm that the data inside the hard disk have not been modified during the investigation.A t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Research and Review on computer forensics
收藏 引用
China Communications 2010年 第6期7卷 37-43页
作者: Guo Hong Jin Bo Huang Daoli Key Laboratory of Information Network Security Ministry of Public Security People's Republic of China (The 3rd Research Institute of Ministry of Public Security) Shanghai 201204 P. R. China
With the development of Internet and information technology, the digital crimes are also on the rise. computer forensics is an emerging research area that applies computer investigation and analysis techniques to help... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Extraction and Supervision of Data of Chain of Custody in computer forensics
收藏 引用
China Communications 2010年 第6期7卷 52-55页
作者: Wang Yi East China University of Political Science and Law Department of Information Science and Technology Shanghai 201620. P. R. China
In case handling, electronic evidence becomes more and more popular. In order to reduce the burden of judges' task to determine the integrity of chain of custody, even no technique experts on the spot, this paper sug... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Application of Multi-level Compressed Decision Tree in computer forensics
Application of Multi-level Compressed Decision Tree in Compu...
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Zheng Guo-Cheng~1,Liu Shu-Fen~2,Wu Long~3 1(College of computer Science and Technology,Jilin University,Changchun 130012, China) 2(College of computer Science and Technology,Jilin University,Changchun 130012, China) 3(College of computer Science and Technology,Jilin University,Changchun 130012,China)
<正>C4.5 algorithm need scan and sort the data repeatedly before it can construct the tree and the CART algorithm doesn’t classify the data *** Multi-level compressed algorithm overcomes the shortcomings of the abo... 详细信息
来源: cnki会议 评论
Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System
收藏 引用
Tsinghua Science and Technology 2013年 第1期18卷 40-50页
作者: Zhen Chen Fuye Han Junwei Cao Xin Jiang Shuo Chen Research Institute of Information Technology and Tsinghua National Laboratory for Information Science and Technology (TNList) Tsinghua University Department of computer Science and Technology Research Institute of Information Technology and Tsinghua National Laboratory for Information Science and Technology (TNList) Tsinghua University Department of Automation Research Institute of Information Technology and Tsinghua National Laboratory for Information Science and Technology (TNList)Tsinghua University
Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bot... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Approach to Analyze Physical Memory Image File of Mac OS X
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2014年 第4期21卷 116-120页
作者: Li-Juan Xu Lian-Hai Wang Shandong Provincial Key Laboratory of computer Network Shandong Computer Science Center( National Supercomputer Center in Jinan)
Memory analysis is one of the key techniques in computer live forensics. Especially,the analysis of a Mac OS X operating system's memory image file plays an important role in identifying the running status of an apple... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Face and Lip Tracking For Person Identification
收藏 引用
China Communications 2010年 第6期7卷 141-144页
作者: Zhang Ying Key Laboratory of Information Network Security Ministry of Public Security People's Republic of China (The Third Research Institute of Ministry of Public Security) Shanghai 201204 P. R. China
This paper addresses the issue of face and lip tracking via chromatic detector, CCL algorithm and canny edge detector. It aims to track face and lip region from static color images including frames read from videos, w... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Method on Extracting Network Connection Information from 64- bit Windows 7 Memory Images
收藏 引用
China Communications 2010年 第6期7卷 44-51页
作者: Wang Lianhai Xu Lijuan Zhang Shuhui Shandong Provincial Key Laboratory of computer Network Jinan 250014 P. R. China Shandong Computer Science Center Jinan 250014 P. R. China
Memory analysis gains a weight in the area of computer live *** to get network connection information is one of the challenges in memory analysis and plays an important role in identifying sources of malicious cyber a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论