期刊文献+

视频化计算机取证系统的设计与实现 被引量:3

Design and Implemention of Video Computer Forensics System
原文传递
导出
摘要 文章基于计算机屏幕录影技术,提出一种新的计算机取证证据关联形式,即视频化计算机取证系统(VCFS)模型。基于该模型,设计并实现了用户行为违反监控规则情况下计算机终端的视频取证功能。最后通过分析在各种环境下视频化计算机取证系统的效率,得出影响系统效率的关键因素,并提出相应的解决思路。 Based on the computer screen-recording technology, this paper gives a new computer forensics model VCFS. In this model, the supervision and forensics function of computer terminals is designed and implemented when users act against supervision rules. Finally, through analyzing the efficiency of VCFS under various environments the key factor that affects the system efficiency is obtained, and corresponding resolutions are proposed.
出处 《信息安全与通信保密》 2009年第7期99-101,104,共4页 Information Security and Communications Privacy
基金 科研院所社会公益研究专项CY0606
关键词 计算机取证 动态取证 行为监控 视频取证 computer forensic dynamic forensic behavior monitor video forensic
  • 相关文献

参考文献4

二级参考文献27

  • 1徐远航.USB Key身份认证产品的产生与发展[J].计算机安全,2004(8):44-45. 被引量:15
  • 2陈航,周剑岚,冯珊.基于SHA和RSA算法 实用有效的双向身份认证系统[J].计算机安全,2006(4):6-8. 被引量:15
  • 3grugq.Defeating forensic analysis on Unix. Phrack #59 article6.http://www.phrack.org/show.phpp=59a=6,2002.
  • 4Farmer D.What are MACtimes Dr. Dobb''s Journal.http://www.ddj.com/documents/s=880/ddj0010f/0010f.htm,2000,10.
  • 5Farmer D Venema W.The coroner''''s toolkit (TCT). Dan Farmer Wietse Venema.http://www.fish.com/tct/,2002.
  • 6grugq scut.Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 article5.http://www.phrack.org/show.phpp=58a=5,2001.
  • 7Oseles L.Computer forensics: The key to solving the crime.http://facuity.ed.umuc.edu/-meinkej/inss690/oseles_2.pdf,2001.
  • 8ParraM.Computer forensics.http://www.giac.org/practical/Moroni_Parra_GSEC.doc,2002.
  • 9Dittrich D.Basic steps in forensic analysis of Unix systems.http://staff.washington.edu/dittrich/misc/forensics/,2000.
  • 10参考消息,1998年

共引文献242

同被引文献15

  • 1秦拯,李建辉,邹建军,綦朝晖.基于模糊理论的实时取证模型[J].湖南大学学报(自然科学版),2006,33(4):115-118. 被引量:6
  • 2PORIKLI F, HAGA T. Event Detection by Eigenvector Decomposition Using Object and Frame FeaturesC]// IEEE Conference on Computer Vision and Pattern Recognition Workshop[s.l.]:IEEE, 2004: 114.
  • 3ZHANG D, DANIEL P G. Semi-supervised Adapted Hmms for Unusual Event Detection[C]//IEEE Conference on Computer Vision and Pattern Recognition. San Diego:CA, 2005: 611-618.
  • 4JUNG R C. Event Detection Using Trajectory Clusting and 4-D Histograms[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2008, 18(11): 1565-1575.
  • 5HORPRASERT T.A Statistical Approach for Real-time Robust Background Subtraction and Shadow Detection[C]//IEEE ICeV FRAME-RATE WORKSHOP. [s. 1.]:IEEE, 1999:l-19.
  • 6LAFFERTY J. Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data[C]//Proc. 18th International Conf. on Machine Learning. San Franeisco:Margan Kaufmann, 2001:282-289.
  • 7DUONG V T. Aetivity Recognition and Abnormality Detection with the Switching Hidden Semi-Markov Model[C]//IEEE Conference on Computer Vision and Pattern Recognition. San Diego:CA, 2005:838-845.
  • 8陈龙,谭响林,高如岱.智能取证技术研究[J].重庆邮电大学学报(自然科学版),2009,21(4):518-522. 被引量:3
  • 9库德来提.热西提,亚森.艾则孜,万琼.计算机取证技术及局限性[J].中国公共安全(学术版),2011(4):122-125. 被引量:2
  • 10陆海先,郭立,桂树,谢锦生.基于潜在主题的视频异常行为分析[J].通信技术,2012,45(7):67-71. 被引量:2

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部