One of the computer crimes is the voice-mail robbery.Some “computer hackers sell unused voice-mail boxes forprofits.Voice-mail boxes are an ideal means of communicationfor those who want to do business legal or illeg...One of the computer crimes is the voice-mail robbery.Some “computer hackers sell unused voice-mail boxes forprofits.Voice-mail boxes are an ideal means of communicationfor those who want to do business legal or illegal,without be-ing found out.These people can use voice-mail systems tomake long distance calls by dialling a local or free phone num-ber without being charged.The systems manufactured by展开更多
With the development of Internet and information technology, the digital crimes are also on the rise. Computer forensics is an emerging research area that applies computer investigation and analysis techniques to help...With the development of Internet and information technology, the digital crimes are also on the rise. Computer forensics is an emerging research area that applies computer investigation and analysis techniques to help detection of these crimes and gathering of digital evidence suitable for presentation in courts. This paper provides foundational concept of computer forensics, outlines various principles of computer forensics, discusses the model of computer forensics and presents a proposed model.展开更多
Grey self-organizing map(GSOM) model is proposed and applied in the detection of intrusion.Through the improvement of the weight adjustment using the GRC(grey relational coefficient),the training results of SOM get be...Grey self-organizing map(GSOM) model is proposed and applied in the detection of intrusion.Through the improvement of the weight adjustment using the GRC(grey relational coefficient),the training results of SOM get better.In the detection of deny of service(DOS) attacks,this model can consider the relativity of the data set of DOS attacks.Finally,the experiments on the DOS data set confirm their validities and feasibilities over this GSOM model.展开更多
文摘One of the computer crimes is the voice-mail robbery.Some “computer hackers sell unused voice-mail boxes forprofits.Voice-mail boxes are an ideal means of communicationfor those who want to do business legal or illegal,without be-ing found out.These people can use voice-mail systems tomake long distance calls by dialling a local or free phone num-ber without being charged.The systems manufactured by
文摘With the development of Internet and information technology, the digital crimes are also on the rise. Computer forensics is an emerging research area that applies computer investigation and analysis techniques to help detection of these crimes and gathering of digital evidence suitable for presentation in courts. This paper provides foundational concept of computer forensics, outlines various principles of computer forensics, discusses the model of computer forensics and presents a proposed model.
基金supported by the Tianjin Key Subject Fundthe Higher Education Science and Technology Development Fund of Tianjin Municipal Education Commission (No.2006BA19)
文摘Grey self-organizing map(GSOM) model is proposed and applied in the detection of intrusion.Through the improvement of the weight adjustment using the GRC(grey relational coefficient),the training results of SOM get better.In the detection of deny of service(DOS) attacks,this model can consider the relativity of the data set of DOS attacks.Finally,the experiments on the DOS data set confirm their validities and feasibilities over this GSOM model.