排序方式: 共有24条查询结果,搜索用时 0 毫秒
21.
我国流动人口犯罪的防控策略——基于“破窗理论”的本土化思考 总被引:1,自引:0,他引:1
“破窗理论”是从心理角度分析犯罪现象延伸发展的原因,主张以控制“犯罪场”为基本手段来防控犯罪的理论学说。这一理论,对于我国防控因人口流动所带来的犯罪剧增现象,具有借鉴意义。“破窗理论”的应用,应当从我国流动人口犯罪的现实国情出发,深化网格化管理模式,建立宏观制度上“防破”和微观现象上“修窗”相呼应的防控体系,并使二者形成合力。 相似文献
22.
Graeme Horsman Ph.D. Alex Caithness B.A. Costas Katsavounidis M.Sc. 《Journal of forensic sciences》2019,64(2):577-586
The Microsoft Windows operating system continues to dominate the desktop computing market. With such high levels of usage comes an inferred likelihood of digital forensic practitioners encountering this platform during their investigations. As part of any forensic examination of a digital device, operating system artifacts, which support the identification and understanding of how a user has behaved on their system provide a potential source of evidence. Now, following Microsoft's April 2018 build 1803 release with its incorporated “Timeline” feature, the potential for identifying and tracking user activity has increased. This work provides a timely examination of the Windows 10 Timeline feature demonstrating the ability to recover activity‐based content from within its stored database log files. Examination results and underpinning experimental methodologies are offered, demonstrating the ability to recover activity tile and process information in conjunction with the Windows Timeline. Further, an SQL query has been provided to support the interpretation of data stored within the ActivitiesCache.db . 相似文献
23.
逆向分析在电子数据取证中的应用——以“QQ密码大划拉”为例 总被引:1,自引:0,他引:1
逆向分析是恶意程序取证的常用方法之一,在揭示恶意程序意图及行为方面发挥着其他方法无法比拟的作用。在对逆向分析基本概念、方法、工具进行介绍的基础上,结合中国大陆地区一起利用恶意程序窃取QQ账号与密码的真实案例,从查壳、脱壳、断点设置、程序跟踪、关键信息获取等方面详细描述了针对恶意程序进行逆向分析的全过程。 相似文献
24.
Acquisition, decoding and presentation of information from mobile devices is complex and challenging. Device memory is usually integrated into the device, making isolation prior to recovery difficult. In addition, manufacturers have adopted a variety of file systems and formats complicating decoding and presentation.A variety of tools and methods have been developed (both commercially and in the open source community) to assist mobile forensics investigators. However, it is unclear to what extent these tools can present a complete view of the information held on a mobile device, or the extent the results produced by different tools are consistent.This paper investigates what information held on a Windows Mobile smart phone can be recovered using several different approaches to acquisition and decoding. The paper demonstrates that no one technique recovers all information of potential forensic interest from a Windows Mobile device; and that in some cases the information recovered is conflicting. 相似文献