咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 2 篇 计算机科学与技术...
    • 2 篇 公安技术
    • 2 篇 网络空间安全
    • 1 篇 机械工程
  • 3 篇 法学
    • 3 篇 公安学
    • 1 篇 法学

主题

  • 5 篇 computer crime
  • 1 篇 control
  • 1 篇 internet
  • 1 篇 privacy
  • 1 篇 computer forensi...
  • 1 篇 data security
  • 1 篇 punishment and p...
  • 1 篇 application soft...
  • 1 篇 computer securit...
  • 1 篇 scout
  • 1 篇 digital evidence
  • 1 篇 conformal mappin...
  • 1 篇 information secu...
  • 1 篇 context
  • 1 篇 the network
  • 1 篇 protection
  • 1 篇 forensics

机构

  • 1 篇 西南政法大学
  • 1 篇 professor of com...
  • 1 篇 tianjin key labo...
  • 1 篇 school of comput...
  • 1 篇 law teaching and...
  • 1 篇 key laboratory o...

作者

  • 1 篇 王怀彬
  • 1 篇 王春东
  • 1 篇 虞鹤峰
  • 1 篇 hongyan liu
  • 1 篇 s.srinivasan
  • 1 篇 余杰
  • 1 篇 guo hong jin bo ...

语言

  • 3 篇 英文
  • 2 篇 中文
检索条件"主题词=computer crime"
5 条 记 录,以下是1-10 订阅
排序:
The Network Era of computer crime Punishment and Prevention Research
The Network Era of Computer Crime Punishment and Prevention ...
收藏 引用
2012 2nd International Conference on Applied Social Science(ICASS 2012)
作者: Hongyan Liu Law Teaching and Research Office Chinese People’s Armed Police Force Academy
The computer crime is with the increasing popularity of the Internet and the emergence of an new crime form. The crime is complex, concealment and huge social harmfulness. In this paper, the existing research theory a... 详细信息
来源: cnki会议 评论
Security and Privacy in the computer Forensics Context
Security and Privacy in the Computer Forensics Context
收藏 引用
2006 10th International Conference on Communication Technology(ICCT 2006)
作者: S.Srinivasan Professor of computer Information Systems Director Center for Information Assurance University of Louisville Louisville Kentucky 40292 USA
Today computers are used in numerous day-to-day activities as a communications tool. In this regard several different applications are used to generate and store important documents. These documents contain vital data... 详细信息
来源: cnki会议 评论
计算机犯罪的侦察和控制
收藏 引用
计算机科学 1999年 第4期 88-90页
作者: 余杰 西南政法大学司法鉴定中心 重庆 400031
一、引言当前,计算机犯罪日益严重,对计算机犯罪的侦察和控制措施的研究已经受到越来越多的计算机专家和犯罪学家的重视,因此,对计算机犯罪的侦察和控制的研究成为一个重要课题。本文力图抛砖引玉。计算机犯罪是一种新的犯罪现象,这种... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Research and Review on computer Forensics
收藏 引用
China Communications 2010年 第6期7卷 37-43页
作者: Guo Hong Jin Bo Huang Daoli Key Laboratory of Information Network Security Ministry of Public Security People's Republic of China (The 3rd Research Institute of Ministry of Public Security) Shanghai 201204 P. R. China
With the development of Internet and information technology, the digital crimes are also on the rise. computer forensics is an emerging research area that applies computer investigation and analysis techniques to help... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Grey self-organizing map based intrusion detection
收藏 引用
Optoelectronics Letters 2009年 第1期5卷 64-68页
作者: 王春东 虞鹤峰 王怀彬 School of computer Science and Technology Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology
Grey self-organizing map(GSOM) model is proposed and applied in the detection of *** the improvement of the weight adjustment using the GRC(grey relational coefficient),the training results of SOM get *** the detectio... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论