计算机取证

  • 网络Computer forensics;computer forensic
计算机取证计算机取证
  1. 基于UNIX系统的计算机取证标准体系研究

    The Study of Computer Forensics Standard System Based On UNIX System

  2. UNIX系统下的计算机取证证据收集与分析

    The Evidences Collection and Analysis for Computer Forensics of UNIX System

  3. 基于Windows日志的计算机取证模型系统设计及实现

    Computer Forensics Research Based on Windows Logs System Design and Implement

  4. Linux环境下的计算机取证工具介绍

    Introduction to Computer Forensic Tools Based on Linux

  5. 计算机取证(computerforensics)正是在这种形势下产生和发展的,它可以对犯罪分子产生威慑作用。

    And the Computer Forensics is developed in this situation , and it has a deterrent effect on criminals .

  6. 该文在计算机取证的基础上,运用DSA签名机制,提出了一种证明计算机证据完整性的一致性方案。

    An integrity scheme based on computer forensics and DSA signature is proposed to testify to the integrity of computer evidence .

  7. 在此基础上,基于Windows系统设计了计算机取证的体系结构,并提出了实现Windows系统现场证据的获取,并据此进行取证分析的Windows系统响应方法。

    On this basis , windows-based computer forensics system architecture is designed which is easy to operation , and the Windows system response method is proposed to obtain evidence and accordingly carry out forensic analysis .

  8. 然后提出计算机取证遇到的问题-计算机证据有效性问题和基于UNIX系统的计算机取证困难问题;

    Then put forward the question that the computer forensics meets & the evidence validity question of the computer forensics and difficult problem that computer based on UNIX system collect evidence ;

  9. 介绍了计算机取证和LZW无损压缩算法的基本概念和应用特点。

    The basic knowledge and application features about computer forensics and LZW lossless compression algorithm are introduced .

  10. 提出了一种基于Multi-Agent的针对实时通信软件的计算机取证模型,给出了系统的总体结构、主要模块的设计,以及采用的关键技术。

    This paper puts forward a model of computer forensics based on Multi-Agent for real time communication soft . It presents the structure of the system , the design and implement of the key modules and technologies .

  11. 重点对计算机取证体系结构和基于UNIX系统的计算机取证关键技术&UNIX取证软件工具包、UNIX证据的收集、UNIX证据的分析等进行研究;

    Key to the computer forensics system structure based on UNIX and the system computer forensics essential technology & UNIX evidence collection software tool bag , the UNIX evidence collection , the UNIX evidence analysis ;

  12. 计算机取证(computerforensics)主要是围绕电子证据来展开工作的,其目的就是将储存在计算机及相关设备中反映犯罪者犯罪的信息成为有效的诉讼证据提供给法庭。

    The computer forensics primarily works around electronics evidence and its purpose is to reflect the offender 's crime in the computer and related equipments and make it become the valid litigation evidence and then offer to the law court .

  13. 安全专家SeanMorrissey周四说,苹果追踪器设备对那些计算机取证团体而言,不是新的设备,或者一个惊奇。

    Sean Morrissey , a security expert , said on Thursday that the tracking on Apple devices isn 't new , or a surprise , to those in the computer forensics community .

  14. 第四,为了更好的容错性和支持计算机取证技术,在安胜OS4.0审计系统的基础之上,对网络审计系统进行了一定研究。

    Last , based on the current secure auditing system , the networking auditing system has been studied , in order to support better fault tolerance and computer forensics .

  15. 基于日志的计算机取证技术的研究及系统设计与实现

    Research on Log-based Computer Forensics Technology , System Design and Implement

  16. 实时通信软件的计算机取证系统研究

    The Study of Computer Forensics System for Real Time Communication Soft

  17. 基于犯罪画像的计算机取证分析方法研究

    Based on the Crime Profiling Research of Computer Forensics Analysis Method

  18. 计算机取证技术与研究用计算机对这种方法进行了模拟。计算机异机种备用设计的研究和实现

    Research and realization of standby computer for different types of computer systems

  19. 基于主动获取的计算机取证方法及实现技术研究

    Research of Computer Forensics Method Based on Active Acquisition and Implementation Techniques

  20. 因此,IT行业中计算机取证技术变得至关重要。

    Therefore , computer forensic is becoming a key point .

  21. 融合各个方面的犯罪证据成为计算机取证研究的一个主要内容。

    It is important to fusion crime evidence from IDS and firewall .

  22. 计算机取证有效打击计算机犯罪

    Fighting effectively against Computer crimes by means of Computer evidence

  23. 计算机取证系统包括证据搜索和证据分析两部分。

    Computer Forensics System includes two sections : evidence search and evidence analysis .

  24. 一种基于孤立点挖掘的计算机取证技术

    A Computer Dynamic Forensic Technique Based on Outlier Detection

  25. 计算机取证技术及其工具应用的研究

    Research of Computer Forensics Technology and Tools in Application

  26. 计算机取证物理内存镜像获取技术的研究与实现

    Research on Acquisition of Physical Memory Image in Computer Forensics and Its Realization

  27. 一种计算机取证中需求定义的方法

    Research on a Definition Method of Digital Forensic Requirement

  28. 隐写取证已经成为了当前计算机取证所面临的严峻挑战之一。

    Steganography forensics has become one of the serious challenges in computer forensics .

  29. 提出一种采用防御、检测、容侵、诱骗、计算机取证的五层网络系统安全模型。

    The paper proposes a five-layers security model .

  30. 支持计算机取证的入侵检测系统的设计与实现

    Design and Implementation of IDS Supporting Computer Forensics