全文获取类型
收费全文 | 236篇 |
免费 | 26篇 |
专业分类
工人农民 | 1篇 |
外交国际关系 | 1篇 |
法律 | 214篇 |
中国政治 | 14篇 |
政治理论 | 3篇 |
综合类 | 29篇 |
出版年
2024年 | 1篇 |
2023年 | 10篇 |
2022年 | 12篇 |
2021年 | 9篇 |
2020年 | 8篇 |
2019年 | 21篇 |
2018年 | 18篇 |
2017年 | 20篇 |
2016年 | 14篇 |
2015年 | 16篇 |
2014年 | 37篇 |
2013年 | 21篇 |
2012年 | 10篇 |
2011年 | 17篇 |
2010年 | 13篇 |
2009年 | 10篇 |
2008年 | 4篇 |
2007年 | 9篇 |
2006年 | 3篇 |
2005年 | 4篇 |
2004年 | 1篇 |
2003年 | 1篇 |
2002年 | 1篇 |
2001年 | 1篇 |
1997年 | 1篇 |
排序方式: 共有262条查询结果,搜索用时 15 毫秒
251.
《Digital Investigation》2014,11(3):214-223
The research described in this paper proposes methods for visually interpreting the content of raw NAND flash memory images into higher level visual artefacts of assistance in reverse engineering and interpreting flash storage formats. A novel method of reverse engineering the structure and layout of individual memory locations within NAND flash images, based on injecting a known signal into a test NAND environment is also proposed. Omissions in the current theory of operation of flash, in particular the role of flash memory controllers in transforming the raw NAND are identified, clarifying the cause of variations seen between images taken using pseudo physical and raw physical techniques. The effectiveness of the approach is validated against raw NAND images from YAFFS2 based Android phones, taken via JTAG and chip-off methods. 相似文献
252.
《Digital Investigation》2014,11(3):187-200
A recent increase in the prevalence of embedded systems has led them to become a primary target of digital forensic investigations. Embedded systems with DVR (Digital Video Recorder) capabilities are able to generate multimedia (video/audio) data, and can act as vital pieces of evidence in the field of digital forensics.To counter anti-forensics, it is necessary to derive systematic forensic techniques that can be used on data fragments in unused (unallocated) areas of files or images. Specifically, the techniques should extract meaningful information from various types of data fragments, such as non-sequential fragmentation and missing fragments overwritten by other data.This paper proposes a new digital forensic system for use on video data fragments related to DVRs. We demonstrate in detail special techniques for the classification, reassembly, and extraction of video data fragments, and introduce an integrated framework for data fragment forensics based on techniques described in this paper. 相似文献
253.
Video file format standards define only a limited number of mandatory features and leave room for interpretation. Design decisions of device manufacturers and software vendors are thus a fruitful resource for forensic video authentication. This paper explores AVI and MP4-like video streams of mobile phones and digital cameras in detail. We use customized parsers to extract all file format structures of videos from overall 19 digital camera models, 14 mobile phone models, and 6 video editing toolboxes. We report considerable differences in the choice of container formats, audio and video compression algorithms, acquisition parameters, and internal file structure. In combination, such characteristics can help to authenticate digital video files in forensic settings by distinguishing between original and post-processed videos, verifying the purported source of a file, or identifying the true acquisition device model or the processing software used for video processing. 相似文献
254.
Evangelos Dragonas MSc Costas Lambrinoudakis PhD Michael Kotsis MSc 《Journal of forensic sciences》2024,69(1):117-130
CCTV surveillance systems are ubiquitous IoT appliances. Their forensic examination has proven critical for investigating crimes. DAHUA Technology is a well-known manufacturer of such products. Despite its global market share, research regarding digital forensics of DAHUA Technology CCTV systems is scarce and currently limited to extracting their video footage, overlooking the potential presence of valuable artifacts within their log records. These pieces of evidence remain unexploited by major commercial forensic software, yet they can hide vital information for an investigation. For instance, these log records document user actions, such as formatting the CCTV system's hard drive or disabling camera recording. This information can assist in attributing nefarious actions to specific users and hence can be invaluable for understanding the sequence of events related to incidents. Therefore, in this paper, several DAHUA Technology CCTV systems are thoroughly analyzed for these unexplored pieces of evidence, and their forensic value is presented. 相似文献
255.
J.D. Xiaolu Zhang Author Vitae 《Computer Law & Security Report》2011,27(3):267-277
Video games often feature a character that evolves into an iconic superhero. In a strange twist of fate, the video game medium will have the opportunity to become a superhero itself. The recording, comic book, and movie industries have rallied around video games as the case of Arnold Schwarzenegger vs. Entertainment Merchants Association and Entertainment Software Association reaches the Supreme Court of the United States. The case concerns a 2005 California ban on the sale of violent video games to minors. The law was later overturned by the District Court and the 9th Circuit Court on appeal. At issue is whether the law violates the First Amendment of the Constitution. Do video games deserve the full protection of the Constitution as a legitimate form of speech, or should it be limited due to its alleged effects on the psychological well-being of minors? This Article will look at the impact this case may have when it reaches the Supreme Court, an analysis of the issues that will be argued, and the history of legislation involving violent video games. 相似文献
256.
257.
Acquisition, decoding and presentation of information from mobile devices is complex and challenging. Device memory is usually integrated into the device, making isolation prior to recovery difficult. In addition, manufacturers have adopted a variety of file systems and formats complicating decoding and presentation.A variety of tools and methods have been developed (both commercially and in the open source community) to assist mobile forensics investigators. However, it is unclear to what extent these tools can present a complete view of the information held on a mobile device, or the extent the results produced by different tools are consistent.This paper investigates what information held on a Windows Mobile smart phone can be recovered using several different approaches to acquisition and decoding. The paper demonstrates that no one technique recovers all information of potential forensic interest from a Windows Mobile device; and that in some cases the information recovered is conflicting. 相似文献
258.
孙展明 《四川警官高等专科学校学报》2011,(3):37-41
视频信息内容分析是视频图像侦查的重要内容之一。围绕案件相关要素来搜寻和发现涉案的视频图像资料,能为视频信息内容分析提供良好的基础。然后紧密围绕涉案人员图像、涉案车辆图像、涉案物品图像进行分析,并将获取的相关信息应用与侦查实践。 相似文献
259.
计算机取证技术研究 总被引:1,自引:0,他引:1
刘东辉 《吉林公安高等专科学校学报》2007,22(4):76-79
随着信息技术的发展,电子证据逐渐成为一种新的诉讼证据。作为计算机领域和法学领域的一门交叉学科,计算机取证正逐渐成为人们研究与关注的焦点,如计算机取证的概念、原则、步骤以及计算机取证的相关技术、计算机取证的发展方向等。 相似文献
260.