咨询与建议

限定检索结果

文献类型

  • 21 篇 会议
  • 7 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 29 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26 篇 工学
    • 17 篇 计算机科学与技术...
    • 12 篇 电气工程
    • 5 篇 控制科学与工程
    • 3 篇 机械工程
    • 3 篇 信息与通信工程
    • 2 篇 公安技术
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 航空宇航科学与技...
    • 1 篇 软件工程
  • 4 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 3 篇 法学
    • 2 篇 公安学
    • 1 篇 法学
  • 1 篇 农学
    • 1 篇 园艺学

主题

  • 29 篇 computer forensi...
  • 5 篇 cloud computing
  • 4 篇 digital forensic
  • 4 篇 digital evidence
  • 4 篇 forensic investi...
  • 3 篇 electronic evide...
  • 2 篇 cryptographic al...
  • 2 篇 volatile data
  • 2 篇 image
  • 2 篇 memory forensic
  • 2 篇 selective deleti...
  • 2 篇 data mining
  • 2 篇 encrypted volume
  • 2 篇 truecrypt
  • 2 篇 private personal...
  • 2 篇 forensic model
  • 2 篇 live forensic
  • 2 篇 wiping
  • 1 篇 multi-agent syss...
  • 1 篇 file system fore...

机构

  • 2 篇 jilin univ dept ...
  • 2 篇 friedrich alexan...
  • 2 篇 univ tenaga nas ...
  • 2 篇 ycce dept comp t...
  • 2 篇 state key lab ma...
  • 2 篇 tech hsch nurnbe...
  • 1 篇 department of co...
  • 1 篇 univ complutense...
  • 1 篇 jspms bsiotr dep...
  • 1 篇 department of co...
  • 1 篇 shandong provinc...
  • 1 篇 sci & technol co...
  • 1 篇 agr univ hebei s...
  • 1 篇 comp forens labs...
  • 1 篇 informat engn un...
  • 1 篇 beijing coll pol...
  • 1 篇 science and tech...
  • 1 篇 school of inform...
  • 1 篇 department of in...
  • 1 篇 agr univ hebei s...

作者

  • 3 篇 mohite monali p.
  • 2 篇 hu liang
  • 2 篇 ismail roslan
  • 2 篇 zoubek christian
  • 2 篇 ardhapurkar s. b...
  • 2 篇 yusoff yunus
  • 2 篇 musa nurul ai'za...
  • 2 篇 yusoff mohd zali...
  • 2 篇 zhao kuo
  • 2 篇 sack konstantin
  • 1 篇 gonnade priyanka
  • 1 篇 singh maninder
  • 1 篇 chhabra gurpal s...
  • 1 篇 singh varinderpa...
  • 1 篇 teng guifa
  • 1 篇 zhao zhenzhou
  • 1 篇 鲍诚毅
  • 1 篇 gulve pallavi r.
  • 1 篇 朱兴全
  • 1 篇 amin saad

语言

  • 27 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Computer forensic"
29 条 记 录,以下是1-10 订阅
排序:
Design and Implementation of a Cloud Based computer forensic Tool  5
Design and Implementation of a Cloud Based Computer Forensic...
收藏 引用
5th International Conference on Communication Systems and Network Technologies (CSNT)
作者: Mohite, Monali P. Ardhapurkar, S. B. YCCE Dept Comp Technol Nagpur Maharashtra India
Nowadays, Cloud computing is receiving more and more attention from the information and communication technology industry recently. Thus, From the demand of cloud users digital forensics in cloud computing are a raw e... 详细信息
来源: 评论
Design and Implementation of a Cloud Based computer forensic Tool
Design and Implementation of a Cloud Based Computer Forensic...
收藏 引用
International Conference on Communication Systems and Network Technologies
作者: Monali P. Mohite S. B. Ardhapurkar Department of Computer Technology Y.C.C.E Nagpur India Department of Computer Technology Y.C.C.E. Nagpur India
Nowadays, Cloud computing is receiving more and more attention from the information and communication technology industry recently. Thus, From the demand of cloud users digital forensics in cloud computing are a raw e... 详细信息
来源: 评论
Current Status and Development Trend of Research of computer forensic
Current Status and Development Trend of Research of Computer...
收藏 引用
4th International Conference on Frontiers of Manufacturing and Design Science (ICFMD 2013)
作者: Fu ZhongYong Zhao ZhenZhou Beijing Coll Polit & Law Dept Informat Technol Beijing 100024 Peoples R China
With the popularity of computer and network technology, information security problem is increasingly highlighted, and the computer related crime phenomenon more and more. computer forensics to protect information secu... 详细信息
来源: 评论
Analysis of Digital Information in Storage Devices Using Supervised and Unsupervised Natural Language Processing Techniques
收藏 引用
FUTURE INTERNET 2023年 第5期15卷 155-155页
作者: Hernandez, Luis Alberto Martinez Orozco, Ana Lucila Sandoval Villalba, Luis Javier Garcia Univ Complutense Madrid UCM Fac Comp Sci & Engn Dept Software Engn & Artificial Intelligence DISI Grp Anal Secur & Syst GASS Off 431Calle Prof Jose Garcia Santesmases 9Ciud Madrid 28040 Spain
Due to the advancement of technology, cybercrime has increased considerably, making digital forensics essential for any organisation. One of the most critical challenges is to analyse and classify the information on d... 详细信息
来源: 评论
Hadoop-based analytic framework for cyber forensics
收藏 引用
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS 2018年 第15期31卷 e3772-e3772页
作者: Chhabra, Gurpal Singh Singh, Varinderpal Singh, Maninder Thapar Univ Comp Sci & Engn Dept Patiala Punjab India
With an exponential increase in the data size and complexity of various documents to be investigated, existing methods of network forensics are found not much efficient with respect to accuracy and detection ratio. Th... 详细信息
来源: 评论
Selective deletion of non-relevant data
收藏 引用
DIGITAL INVESTIGATION 2017年 20卷 S92-S98页
作者: Zoubek, Christian Sack, Konstantin Tech Hsch Nurnberg Georg Simon Ohm Dept Comp Sci Nurnberg Germany Friedrich Alexander Univ Erlangen Nurnberg FAU Dept Comp Sci Erlangen Germany
In crime investigation, especially in computer crime investigations, seizure and analysis of digital evidence is a de facto standard procedure. To prevent alterations on the original digital evidence a so called (bitw... 详细信息
来源: 评论
Selective deletion of non-relevant data  4
Selective deletion of non-relevant data
收藏 引用
4th Annual DFRWS Europe Conference
作者: Zoubek, Christian Sack, Konstantin Tech Hsch Nurnberg Georg Simon Ohm Dept Comp Sci Nurnberg Germany Friedrich Alexander Univ Erlangen Nurnberg FAU Dept Comp Sci Erlangen Germany
In crime investigation, especially in computer crime investigations, seizure and analysis of digital evidence is a de facto standard procedure. To prevent alterations on the original digital evidence a so called (bitw... 详细信息
来源: 评论
Qualitative and Quantitative Analysis of Cloud Based Digital forensic Tool  10
Qualitative and Quantitative Analysis of Cloud Based Digital...
收藏 引用
10th International Conference on Intelligent Systems and Control (ISCO)
作者: Mohite, Monali P. Deshmukh, Jyoti Y. Gulve, Pallavi R. JSPMs BSIOTR Dept Comp Engn Pune Maharashtra India
Digital evidence stored on digital devices play an important role in a wide range of types of crime, including murder, computer intrusion, espionage, extortion and child pornography in proof of a fact about what did o... 详细信息
来源: 评论
The Development of an Images Detection System Based on Extracting the Colour Gradient Co-occurrence Matrix Features  9
The Development of an Images Detection System Based on Extra...
收藏 引用
9th International Conference on Developments in eSystems Engineering (DeSE)
作者: Aljarf, Ahd Amin, Saad Filippas, John Shuttelworth, James Coventry Univ Fac Engn & Comp Comp Dept Coventry W Midlands England
Many steganalysis methods have been introduced in the literature. These methods were developed to combat specific steganography techniques and to detect specific image formats. However, no single steganalysis method o... 详细信息
来源: 评论
Utilizing Virtualization Technology in computer forensic
Utilizing Virtualization Technology in Computer Forensic
收藏 引用
2011 IEEE International Conference on Intelligent Computing and Intelligent Systems(ICIS 2011)
作者: Liming Cai1,Bo Jin1,Jing Sha1,Xi Xie2 1.Key Laboratory of Information Network Security,Ministry of Public Security,People’s Republic of China The 3rd Research Institute of Ministry of Public Security Shanghai,China2.The Administrative Centre for China's Agenda 21 Beijing,China
In this paper we firstly introduce the conventional process of computer *** we discuss the great advantage of virtualization *** we propose to utilize virtualization technology in computer *** an example scenario is d... 详细信息
来源: 评论