首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21篇
  免费   3篇
法律   17篇
中国政治   3篇
综合类   4篇
  2023年   1篇
  2019年   3篇
  2018年   2篇
  2017年   4篇
  2016年   1篇
  2015年   1篇
  2014年   1篇
  2013年   2篇
  2012年   1篇
  2011年   2篇
  2007年   1篇
  2005年   1篇
  2004年   1篇
  2003年   2篇
  2002年   1篇
排序方式: 共有24条查询结果,搜索用时 0 毫秒
21.
“破窗理论”是从心理角度分析犯罪现象延伸发展的原因,主张以控制“犯罪场”为基本手段来防控犯罪的理论学说。这一理论,对于我国防控因人口流动所带来的犯罪剧增现象,具有借鉴意义。“破窗理论”的应用,应当从我国流动人口犯罪的现实国情出发,深化网格化管理模式,建立宏观制度上“防破”和微观现象上“修窗”相呼应的防控体系,并使二者形成合力。  相似文献   
22.
The Microsoft Windows operating system continues to dominate the desktop computing market. With such high levels of usage comes an inferred likelihood of digital forensic practitioners encountering this platform during their investigations. As part of any forensic examination of a digital device, operating system artifacts, which support the identification and understanding of how a user has behaved on their system provide a potential source of evidence. Now, following Microsoft's April 2018 build 1803 release with its incorporated “Timeline” feature, the potential for identifying and tracking user activity has increased. This work provides a timely examination of the Windows 10 Timeline feature demonstrating the ability to recover activity‐based content from within its stored database log files. Examination results and underpinning experimental methodologies are offered, demonstrating the ability to recover activity tile and process information in conjunction with the Windows Timeline. Further, an SQL query has been provided to support the interpretation of data stored within the ActivitiesCache.db .  相似文献   
23.
逆向分析是恶意程序取证的常用方法之一,在揭示恶意程序意图及行为方面发挥着其他方法无法比拟的作用。在对逆向分析基本概念、方法、工具进行介绍的基础上,结合中国大陆地区一起利用恶意程序窃取QQ账号与密码的真实案例,从查壳、脱壳、断点设置、程序跟踪、关键信息获取等方面详细描述了针对恶意程序进行逆向分析的全过程。  相似文献   
24.
Acquisition, decoding and presentation of information from mobile devices is complex and challenging. Device memory is usually integrated into the device, making isolation prior to recovery difficult. In addition, manufacturers have adopted a variety of file systems and formats complicating decoding and presentation.A variety of tools and methods have been developed (both commercially and in the open source community) to assist mobile forensics investigators. However, it is unclear to what extent these tools can present a complete view of the information held on a mobile device, or the extent the results produced by different tools are consistent.This paper investigates what information held on a Windows Mobile smart phone can be recovered using several different approaches to acquisition and decoding. The paper demonstrates that no one technique recovers all information of potential forensic interest from a Windows Mobile device; and that in some cases the information recovered is conflicting.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号