期刊文献+

计算机取证技术的应用分析 被引量:1

Application and Analysis of Computer Forensics Technology
下载PDF
导出
摘要 在时代的发展下,计算机网络技术在各个领域都得到了广泛的应用,在这一背景下,人们开始重视网络安全隐患,针对此,国家也制定了一系列的法律法规。计算机取证技术是一种重要的技术,将计算机应用在取证工作上对于取证工作的顺利开展有着积极的意义。该文主要针对计算机取证技术的应用进行分析,并总结国内外计算机取证技术的发展,探讨我国计算机取证技术的发展对策。 Under the development of the times,computer network technology has been widely used in various fields.Under thisbackground,people have begun to pay attention to the hidden dangers of network security,and a series of laws and regulationshave been formulated.Computer forensics technology is an important technology,the computer application in forensic workfor the smooth development of forensic work has a positive meaning.This article mainly analyzes the application of computerforensics technology and summarizes the development of computer forensics technology both at home and abroad,and discussesthe development countermeasure of computer forensics technology in our country.
作者 杨曦 Yang Xi(Tianjiabing Middle School of Chengdu, Chengdu SiChuan 610061, China)
出处 《科技资讯》 2016年第35期30-31,共2页 Science & Technology Information
关键词 计算机取证技术 应用 分析 Computer forensics Application Analysis
  • 相关文献

参考文献3

二级参考文献13

  • 1李炳龙,王清贤,罗军勇,刘镔.可信计算环境中的数字取证[J].武汉大学学报(理学版),2006,52(5):523-526. 被引量:9
  • 2Kruse W, Heiser J. Computer Forensics: Incident Response Essentials[M]. Addison Wesley, 2001.
  • 3Reith M, Carr C. An examinatkm of digital forensics modeh[J]. International .Journal of Digital Evidence, 2002,1 (3): 1- 12.
  • 4Scicntiflc Working Group on Digital Evidence. ASCLD Glossary Definitions: Version 1.0[EB/OL], Available at: http://www.swgde.org. 2005.
  • 5Carrie M W. An Historicai Perspective of Digital Evidence: A F ic Scientist's View[J1. International Journal of Digital Evidence (IJDE), 2002,1 (1):235-246.
  • 6United States National Institute of Justice Technical Working Group for Electronic Crime Scene Investigation. Electronic Crime Scene Investigation: A Guide for First Responders, July 2-X)1.
  • 7Binglong Li, Qingxian Wang, Junyong Luo, Forensic Analysis of Document Fragment Based On SVMIC1. 2006 International Conference on Intelligent Information Hiding and Multimedia. 2(X)6: 236-239.
  • 8Peter S. The Application of Formal Methods to Root Cause Analysis of Digital Incidents[J]. lntemationalJoumal of Digital Evidence. 2004,3(1).
  • 9Pavel G, Ahmed P. Finite State Machine Approach to Digital Event Reconstruction[J]. International Journal of Digital Investigation, 2004,1 (2).
  • 10李炳龙 王清贤 罗军勇 等.文档碎片分类模型及其关键问题[J].哈尔滨工业大学学报,2006,38:834-834.

共引文献14

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部