首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   293篇
  免费   31篇
各国政治   3篇
工人农民   1篇
世界政治   3篇
外交国际关系   7篇
法律   229篇
中国共产党   1篇
中国政治   28篇
政治理论   17篇
综合类   35篇
  2024年   1篇
  2023年   12篇
  2022年   11篇
  2021年   13篇
  2020年   10篇
  2019年   21篇
  2018年   19篇
  2017年   23篇
  2016年   19篇
  2015年   19篇
  2014年   43篇
  2013年   31篇
  2012年   11篇
  2011年   17篇
  2010年   14篇
  2009年   13篇
  2008年   5篇
  2007年   12篇
  2006年   6篇
  2005年   7篇
  2004年   6篇
  2003年   3篇
  2002年   4篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
排序方式: 共有324条查询结果,搜索用时 31 毫秒
131.
Minecraft, a Massively Multiplayer Online Game (MMOG), has reportedly millions of players from different age groups worldwide. With Minecraft being so popular, particularly with younger audiences, it is no surprise that the interactive nature of Minecraft has facilitated the commission of criminal activities such as denial of service attacks against gamers, cyberbullying, swatting, sexual communication, and online child grooming. In this research, there is a simulated scenario of a typical Minecraft setting, using a Linux Ubuntu 16.04.3 machine (acting as the MMOG server) and Windows client devices running Minecraft. Server and client devices are then examined to reveal the type and extent of evidential artefacts that can be extracted.  相似文献   
132.
This study concentrates on samples of bare pork skin, with and without bristles, and dried bovine ribs shot with a semi‐automatic pistol to find the best methodology and sampling surface in the search for inorganic gunshot residues (IGSR). Four quadrants of known surface areas were sampled at different distances from the bullet's hole with different swabs: tapes in graphite, Leukosilk® white tape, 3M® transparent tape, and a cotton swab to assess the technique able to collect the highest amounts of IGSR with the lowest contribution of the blank. The cotton swab wet in 10% HNO3 gave the best results. The highest amounts of IGSR, measured by ICP‐OES and MS, were detected on a surface of 3‐cm radius from the bullet's edge. The amount of metals collected decreased with the firing distance between 20 and 60 cm. The procedure was efficient for sampling different tissues like skin and bones.  相似文献   
133.
The use of search engines and associated search functions to locate content online is now common practice. As a result, a forensic examination of a suspect's online search activity can be a critical aspect in establishing whether an offense has been committed in many investigations. This article offers an analysis of online search URL structures to support law enforcement and associated digital forensics practitioners interpret acts of online searching during an investigation. Google, Bing, Yahoo!, and DuckDuckGo searching functions are examined, and key URL attribute structures and metadata have been documented. In addition, an overview of social media searching covering Twitter, Facebook, Instagram, and YouTube is offered. Results show the ability to extract embedded metadata from search engine URLs which can establish online searching behaviors and the timing of searches.  相似文献   
134.
The forensic analysis of mobile handsets is becoming a more prominent factor in many criminal investigations. Despite such devices frequently storing relevant evidential content to support an investigation, accessing this information is becoming an increasingly difficult task due to enhanced effective security features. Where access to a device's resident data is not possible via traditional mobile forensic methods, in some cases it may still be possible to extract user information via queries made to an installed intelligent personal assistant. This article presents an evaluation of the information which is retrievable from Apple's Siri when interacted with on a locked iOS device running iOS 11.2.5 (the latest at the time of testing). The testing of verbal commands designed to elicit a response from Siri demonstrate the ability to recover call log, SMS, Contacts, Apple Maps, Calendar, and device information which may support any further investigation.  相似文献   
135.
Communication apps can be an important source of evidence in a forensic investigation (e.g., in the investigation of a drug trafficking or terrorism case where the communications apps were used by the accused persons during the transactions or planning activities). This study presents the first evidence‐based forensic taxonomy of Windows Phone communication apps, using an existing two‐dimensional Android forensic taxonomy as a baseline. Specifically, 30 Windows Phone communication apps, including Instant Messaging (IM) and Voice over IP (VoIP) apps, are examined. Artifacts extracted using physical acquisition are analyzed, and seven digital evidence objects of forensic interest are identified, namely: Call Log, Chats, Contacts, Locations, Installed Applications, SMSs and User Accounts. Findings from this study would help to facilitate timely and effective forensic investigations involving Windows Phone communication apps.  相似文献   
136.
2017年底发布的《侵权责任法·医疗损害责任》司法解释规定了新的鉴定规则:确定了医疗损害专门性问题鉴定的概念及内容,取鉴定申请替代患方举证能力的不足,规定了新的鉴定人资格要求,明确了医疗过错判定的要求;明确了因果关系分级要求;明确了医疗损害鉴定的程序要求等。但仍然保留了医疗损害鉴定二元化模式。新的规定给我国医疗损害鉴定带来了新的挑战,尤其是鉴定人资格、专家辅助人意见可以成为定案依据的规定,将直接影响我国的法医开展医疗损害鉴定。笔者由此提出了以下建议:(1)医疗鉴定要回归科学性、公益性、规范性;(2)医疗损害鉴定回归同行评议是必然趋势;(3)应当建立统一的临床医学鉴定专家库;(4)应当研究医疗损害鉴定的理论、原则和方法。  相似文献   
137.
The advent of cloud computing has brought the computing power of corporate data processing and storage centers to lightweight devices. Software-as-a-service cloud subscribers enjoy the convenience of personal devices along with the power and capability of a service. Using logical as opposed to physical partitions across cloud servers, providers supply flexible and scalable resources. Furthermore, the possibility for multitenant accounts promises considerable freedom when establishing access controls for cloud content. For forensic analysts conducting data acquisition, cloud resources present unique challenges. Inherent properties such as dynamic content, multiple sources, and nonlocal content make it difficult for a standard to be developed for evidence gathering in satisfaction of United States federal evidentiary standards in criminal litigation. Development of such standards, while essential for reliable production of evidence at trial, may not be entirely possible given the guarantees to privacy granted by the Fourth Amendment and the Electronic Communications Privacy Act. Privacy of information on a cloud is complicated because the data is stored on resources owned by a third-party provider, accessible by users of an account group, and monitored according to a service level agreement. This research constructs a balancing test for competing considerations of a forensic investigator acquiring information from a cloud.  相似文献   
138.
The field of digital forensics maintains significant reliance on the software it uses to acquire and investigate forms of digital evidence. Without these tools, analysis of digital devices would often not be possible. Despite such levels of reliance, techniques for validating digital forensic software are sparse and research is limited in both volume and depth. As practitioners pursue the goal of producing robust evidence, they face the onerous task of both ensuring the accuracy of their tools and, their effective use. Whilst tool errors provide one issue, establishing a tool's limitations also provides an investigatory challenge leading the potential for practitioner user-error and ultimately a grey area of accountability. This article debates the problems surrounding digital forensic tool usage, evidential reliability and validation.  相似文献   
139.
计算机取证的时间分析方法   总被引:2,自引:0,他引:2  
从一个时间标签被取证人员错误修改的案例出发,介绍计算机的日期和时间结构、MAC时间标签的含义,以及本地时间和UTC时间的转换问题,提出一些帮助涉及时间问题调查的规则和建议。  相似文献   
140.
The paper retraces both a scientific itinerary and what might be described as a stratification and a history of the dominant social forms of structuring space: nomadism, sedentariness, mobility. It argues against a possible evolutionist interpretation of this scheme by privileging a synchronic observation of the various intersecting spatial forms in what might be called the truth of the place (which is the stage of intersection). The theoretical idea of a mobile space is thus schematized by opposing it to the paradigm of fixedness which dominates classical as well as modern spatial analysis. The rapprochement of nomadic space (being the source of reflection) and mobile space (being the result of reflection) is presented as a “methodological” space avoiding metaphorical vagueness.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号