共 50 条
- [21] Network Forensics Attack-Analysis Model Based on Similarity of Intention [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATION AND EDUCATION TECHNOLOGY (ICCAET 2011), 2011, : 110 - 113
- [22] An investigation into Unmanned Aerial System (UAS) forensics: Data extraction & analysis [J]. FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2022, 41
- [25] Blockchain Model of Cloud Forensics [J]. 1600, Beijing University of Posts and Telecommunications (40):
- [26] File system journal forensics [J]. IFIP Advances in Information and Communication Technology, (231-244):
- [27] AN INCIDENT RESPONSE MODEL FOR INDUSTRIAL CONTROL SYSTEM FORENSICS BASED ON HISTORICAL EVENTS [J]. CRITICAL INFRASTRUCTURE PROTECTION XIII, 2019, 570 : 311 - 328
- [28] Secret Sharing Database System for Preventing Frequency Analysis [J]. 2017 IEEE 6TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2017,
- [29] Disk Memory Forensics Analysis of Memory Forensics Frameworks Flow [J]. 2017 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2017,
- [30] Research and Implementation of Computer Network User Behavior Forensics Analysis System Based on System Log [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 458 - 461