首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   118篇
  免费   0篇
各国政治   2篇
世界政治   1篇
法律   44篇
中国政治   7篇
政治理论   1篇
综合类   63篇
  2022年   1篇
  2021年   2篇
  2019年   3篇
  2018年   2篇
  2016年   1篇
  2015年   1篇
  2014年   8篇
  2013年   6篇
  2012年   1篇
  2011年   10篇
  2010年   2篇
  2009年   7篇
  2008年   11篇
  2007年   11篇
  2006年   10篇
  2005年   5篇
  2004年   9篇
  2003年   9篇
  2002年   4篇
  2001年   8篇
  2000年   1篇
  1999年   1篇
  1997年   1篇
  1986年   1篇
  1984年   1篇
  1983年   2篇
排序方式: 共有118条查询结果,搜索用时 15 毫秒
71.
Any specific technology derives attributes from the generic technologies of which it is an instance. A drone is a flying computer. It is dependent on local data communications from its onboard sensors and to its onboard effectors, and on telecommunications links over which it receives data-feeds and command-feeds from terrestrial and perhaps airborne sources and from satellites. A drone acts on the world, and is therefore a robot. The remote pilots, and the operators of drone facilities such as cameras, depend on high-tech tools that interpret data that display transmitted, enhanced and generated image and video, and that enable the composition of commands. So drone operators are already cyborgs. Many drones carry cameras and are used for surveillance. Computing, data communications, robotics, cyborgisation and surveillance offer power and possibilities, but with them come disbenefits and risks. Critical literatures exist in relation to all of those areas. An inspection of those literatures should provide insights into the limitations of drones, and the impacts and implications arising from their use.  相似文献   
72.
《Digital Investigation》2014,11(2):111-119
To discriminate natural images from computer generated graphics, a novel identification method based on the features of the impact of color filter array (CFA) interpolation on the local correlation of photo response non-uniformity noise (PRNU) is proposed. As CFA interpolation generally exists in the generation of natural images and it imposes influence on the local correlation of PRNU, the differences between the PRNU correlations of natural images and those of computer generated graphics are investigated. Nine dimensions of histogram features are extracted from the local variance histograms of PRNU to represent the identification features. The discrimination is accomplished by using a support vector machine (SVM) classifier. Experimental results and analysis show that it can achieve an average identification accuracy of 99.43%, and it is robust against scaling, JPEG compression, rotation and additive noise. Thus, it has great potential to be used in image source pipelines forensics.  相似文献   
73.
In the last few years, a lot of attention has been paid to what is usually called ‘ICT Crime’. In this contribution, the term ICT Crime is analysed from both a practical and theoretical legal perspective. It will be argued that it is very difficult if not impossible to define ICT Crime unequivocally. Furthermore, there seems to be insufficient grounds to see ICT criminality as an autonomous legal discipline, as an independent functional discipline or as a specialisation. An important reason for dealing with ICT Crime as if it is a problem area seems to be fear in governmental organisations that new technology could lead to forms of criminality that are outside their reach of control. Furthermore, the application of ICT has led to a reorientation of legal powers with respect to investigation and prosecution. However, these subjects should be dealt with at an international level.  相似文献   
74.
目前,全国各级公安机关根据公安部的统一要求,除了绘制犯罪现场草图外,均要求用电脑绘制犯罪现场正式图,这也是公安执法规范化的具体要求之一。经过十多年的不断努力,运用电脑绘制犯罪现场图技术得到了长足的发展,然而,当前各级公安机关在利用电脑绘制现场图时却仍然存在具体操作上的难点,希望得到进一步的完善和解决。  相似文献   
75.
本文针对计算机知识更新较快,学生在学习初期学精学好比较困难的特点,在计算机维修与维护教学过程中,利用网络资源与多媒体技术相结合的手段来增加课堂学习时的信息量、提高学习兴趣、扩大学生知识面、培养学生的动手能力,充分利用网络上的资源为学生学习计算机维护打下坚实的理论与实践基础,也为公安信息化的应用打下良好的实践基础。  相似文献   
76.
This paper discusses the use of communication technology to commit crimes, including crime facts and crime techniques. The analysis focuses on the security of voice over Internet protocol (VoIP), a prevention method against VoIP call attack and the attention points for setting up an Internet phone. The importance of digital evidence and digital forensics are emphasised. This paper provides the VoIP digital evidence forensics standard operating procedures (DEFSOP) to help police organisations and establishes an experimental platform to simulate phone calls, hacker attacks and forensic data. Finally, this paper provides a general discussion of a digital evidence strategy that includes VoIP for crime investigators who are interested in digital evidence forensics.  相似文献   
77.
随着计算机硬件技术的快速发展和网络应用的普及,计算机犯罪取证工作的难度越来越大。目前,电子证据的分析和取证主要还是依赖人工进行。为有效打击计算机犯罪,警察机构要在坚持全面、可信、准确和符合法律法规规定进行计算机取证的基础上,充分利用已有资源,通过开展现场取证、加强合作与分层培训以及改进计算机取证的手段与工具,进一步提高取证的速度与效率,加强计算机犯罪取证的工作措施。  相似文献   
78.
The Internet community has been addressing the unethical behavior of juvenile delinquents for years. Nevertheless, the concepts of hacker shame and ethics have received little empirical study from a theoretical perspective in the field of cyber criminology. Braithwaite's re-integrative Shaming Theory posits that it can restrain individuals from committing future offenses, and that those who participate in this shaming process are less likely to consider breaking the law in the first place. Among the abundance of criminological theories, the re-integrative Shaming Theory may be the most suitable theory to restrain hacker activities. This study focuses on the working relationship between nine juvenile delinquents and the shaming mechanism applied to them. However, applying this approach to reduce recidivism among computer hackers requires a great deal of time and effort. It is proposed that the state of shame or remorse is associated with the compounded affective processes of hacker ethics. The proposed solution creates a code of ethics for hackers, distinguishes right from wrong, and ensures a greater success for Braithwaite's re-integrative shaming methods. This paper discusses the problems and solutions related to the Shaming Theory, as well as their usefulness in the context of community-based restorative justice. It is argued that re-integrative shaming, without appropriate consideration for the offender's personal code of ethics, is insufficient when handling hacking offenses committed by juveniles. Our main concern is to find out how to help or encourage the offender's reintegration and re-entering into the community, and how s/he can avoid failure. It is hoped that our proposed strategy can prevent future offending behaviors by these juveniles. Implications drawn from the findings are discussed, and suggestions are offered to ensure the success of this theory when applied to juvenile hackers.  相似文献   
79.
This article considers the legal efficacy of terms found in the end-user licences (EULAs) of Massively Multiplayer Online Role-Playing Games (MMORPGs). The article focuses on selected terms in the EULAs of well-known MMORPGs, Everquest and Runescape as well as a more recent MMORPG, Path of Exile. Although there are many examples of inappropriate and unenforceable terms in EULAs, computer games provide a particularly salient example. Eager for access to a game, players accept the EULA without question and, unaware of their rights or keen to avoid costly litigation, rarely challenge the terms. Given the value of the games industry to the international economy, the article recommends that international guidance for EULA content is needed.  相似文献   
80.
计算机网络攻击在技术上已经具备实战价值,引起各国的重视;但它的匿名性、跨国性和非对称性等特点,以及随之而来的网络军备竞赛,对各国的网络安全构成严峻的挑战。现行国际法所存在的空白、盲点,有可能导致网络战和计算机网络攻击的滥用。为防止网络战争的发生,国际社会有必要运用法律手段来规制计算机网络攻击。而鉴于达成具有普遍约束力的法律文件尚有难度,可尝试先通过外交声明之类的"软法"文件,来汇聚共识,形成合力。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号