取证

qǔ zhèng
  • obtain evidence;collect evidence;take the evidence
取证取证
取证 [qǔ zhèng]
  • [collect evidence] 寻取证据

  • 严格取证

取证[qǔ zhèng]
  1. 这里最关键的是取证。

    The most crucial is to obtain evidence here .

  2. 因此,取证难是我国司法实践中一个现实问题。

    Thus ," obtain evidence is hard " becoming a tough problem in our judicial practice .

  3. 基于Windows日志的计算机取证模型系统设计及实现

    Computer Forensics Research Based on Windows Logs System Design and Implement

  4. 基于Bloomfilter引擎的分布式网络取证系统

    Distributed network forensics system based on Bloom filter engine

  5. 数字图像取证技术(DigitalImageForensics)被认为是解决以上问题的关键技术之一。

    Digital image forensics has been considered as one of the key technology to solve these problems .

  6. 本文针对计算机静态取证技术中存在的问题,提出了基于多Agent的分布式计算机动态取证系统模型。

    In view of the weakness of computer static forensics , a distributed dynamic forensics system based on multi-agent was designed .

  7. MSSqlServer数据库的取证检验

    MS SQL Server database forensics

  8. 基于Multi-Agent的网络入侵取证模型的设计

    Design of Network Intrusion Forensics Model Based on Multi-Agent

  9. WTO与我国司法审查范围民事抗诉中检察机关调查取证的范围

    WTO and China 's Scope of Judicial Review On the Scope of Investigating Evidence of Supervision Organs in Civil Counterappeal

  10. 基于Multi-Agent的网络入侵动态取证

    Dynamic forensics of network intrusion based on multi-agent

  11. 基于SN并行结构的网络取证日志隐匿安全管理

    Network Forensics Log Anonymous Security Management Based on the SN Parallel Structure

  12. 文中在基于网络的取证分析中作了一些尝试,在Linux操作系统下综合利用基于主机和网络的入侵检测技术,开发出一套高效实用的基于Web的入侵检测与取证系统。

    In this paper it exploited under Linux a web based computer forensic system , which is based on both host and network .

  13. 基于CSP的进程行为取证方法研究

    Research on Forensic Methods of the Process Behavior Based on CSP

  14. WLAN监听是对WLAN进行监控和对利用WLAN实施网络犯罪活动进行侦察和取证的基础。

    WLAN sniffer is the basement of WLAN monitor and control and it can produce evidence of network crime .

  15. 基于小波变换和Zernike矩的图像区域复制篡改鲁棒取证

    Robust forensics for image regional duplication and forgery based on DWT and Zernike moment

  16. 基于Shamir秘密共享的安全取证服务器方案

    A Safe Server for Computer Forensics Based on Shamir Secret Sharing Scheme

  17. 指出,企业取证后应继续开展QC小组活动,提高QC活动的质量。

    It is pointed out that enterprises should continue developing QC group activities and boost the quality of QC activities after the attestation .

  18. Cornell提供了一种基于研究取证团体、家庭和学校基础上的暴力预防途径和项目。

    Cornell offers an overview of a variety of research-validated community , family , and school-based violence-prevention approaches and programs .

  19. 本文在深入理解HTTP协议规范的工作流程基础上提出并实现了一种新型的实时查找并取证网络上存在的非法网站和有害信息的系统&非法互联网网站及服务实时监管取证系统。

    In this article , a design of a real-time monitoring and controlling forensics system of illegal website and its services has been proposed on the basis of understanding working flow the HTTP .

  20. 然后提出计算机取证遇到的问题-计算机证据有效性问题和基于UNIX系统的计算机取证困难问题;

    Then put forward the question that the computer forensics meets & the evidence validity question of the computer forensics and difficult problem that computer based on UNIX system collect evidence ;

  21. Honeypots网络取证技术研究

    Research on Network Forensics Based on Honeypots

  22. 基于Benford定律的高斯模糊篡改取证

    Forensics of Gaussian Blur Tempering Based on Benford 's Law

  23. 提出了一种基于Multi-Agent的针对实时通信软件的计算机取证模型,给出了系统的总体结构、主要模块的设计,以及采用的关键技术。

    This paper puts forward a model of computer forensics based on Multi-Agent for real time communication soft . It presents the structure of the system , the design and implement of the key modules and technologies .

  24. 重点对计算机取证体系结构和基于UNIX系统的计算机取证关键技术&UNIX取证软件工具包、UNIX证据的收集、UNIX证据的分析等进行研究;

    Key to the computer forensics system structure based on UNIX and the system computer forensics essential technology & UNIX evidence collection software tool bag , the UNIX evidence collection , the UNIX evidence analysis ;

  25. 计算机取证(computerforensics)主要是围绕电子证据来展开工作的,其目的就是将储存在计算机及相关设备中反映犯罪者犯罪的信息成为有效的诉讼证据提供给法庭。

    The computer forensics primarily works around electronics evidence and its purpose is to reflect the offender 's crime in the computer and related equipments and make it become the valid litigation evidence and then offer to the law court .

  26. 评委之一蒙彼利埃市执行长WilliamFraser用笔尖挑着鞋子,好像侦探取证时害怕沾染证物一样。

    Judge William Fraser , who is Montpelier 's city manager , held one up using the tip of a pen , like a crime scene investigator trying not to taint the evidence .

  27. 本文针对JPEG图像复制-粘贴篡改的盲取证技术进行研究,主要的工作内容如下:(1)提出了一种基于块效应的同幅JPEG图像复制-粘贴篡改检测方法。

    This paper focus on JPEG image forensics , the main work is as follows : ( 1 ) A method based on block artifacts for detecting copy-move tampering on the same JPEG image is proposed .

  28. 我们将要取证,获取有关该问题的意见和评论,然后把这些拿给CRU成员和其他人。

    We will be calling for evidence , for submissions and comments on the issues that we will be putting to the members of CRU and others .

  29. 开放式系统的攻击取证和系统恢复机制Eudemon的设计及实现

    Design and Implementation of a Mechanism of Intrusion Evidence Audit and System Recovery in Open Systems : Eudemon

  30. 据数名知情的官员和业内高管表示,欧盟委员会几个月来一直在为本案调查取证,主要聚焦于华为(huawei)和中兴(zte)这两家中国移动网络设备制造商的活动。

    The Commission has been piecing together the case for months , according to several officials and executives briefed on the case , focusing on the activities of two Chinese makers of mobile network equipment , Huawei and ZTE .