共 50 条
- [1] The Research of the constructing Based on the Computer Forensics [J]. NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, : 254 - 257
- [2] Research and Implementation of Computer Network User Behavior Forensics Analysis System Based on System Log [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 458 - 461
- [4] Computer Forensics Research and Implementation Based on NTFS File System [J]. 2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 519 - +
- [5] Research on Ontology-based Cluster Analysis in Computer Forensics [J]. 2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 2, 2014, : 590 - 594
- [6] The application research on network forensics [J]. Jingfang, H. (jdzhjf@163.com), 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (05):
- [7] The Research on the Tactic of Computer Static Forensics [J]. 2012 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING (ICAISC 2012), 2012, 12 : 207 - 212
- [8] Research on Relevant Problems of Computer Crime Forensics [J]. PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 3: COMPUTER NETWORKS AND ELECTRONIC ENGINEERING, 2011, 112 : 169 - 173
- [9] Research on the Key Technology of Secure Computer Forensics [J]. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 649 - 652
- [10] A new model of immune-based network surveillance and dynamic computer forensics [J]. ADVANCES IN NATURAL COMPUTATION, PT 2, PROCEEDINGS, 2005, 3611 : 804 - 813