首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   508篇
  免费   5篇
各国政治   9篇
工人农民   3篇
世界政治   6篇
外交国际关系   59篇
法律   262篇
中国共产党   5篇
中国政治   16篇
政治理论   22篇
综合类   131篇
  2023年   7篇
  2022年   19篇
  2021年   24篇
  2020年   18篇
  2019年   15篇
  2018年   34篇
  2017年   12篇
  2016年   12篇
  2015年   17篇
  2014年   43篇
  2013年   39篇
  2012年   19篇
  2011年   32篇
  2010年   16篇
  2009年   47篇
  2008年   39篇
  2007年   35篇
  2006年   26篇
  2005年   11篇
  2004年   15篇
  2003年   11篇
  2002年   6篇
  2001年   10篇
  2000年   2篇
  1999年   2篇
  1997年   1篇
  1996年   1篇
排序方式: 共有513条查询结果,搜索用时 15 毫秒
441.
"科技强警"战略实施以来,公安装备管理工作积极向科技化进程迈进。但是在创新的过程中出现了创新的举措和现实需求之间的偏差,影响了公安装备整体效能的发挥。通过对公安装备管理发展的简单归纳,分析总结出目前公安装备管理亟待解决的问题,进而探讨"科技强警"战略下的公安装备管理创新的必然路径。  相似文献   
442.
为了维护社会治安的正常秩序,警务工作要建立有效社会控制机制,应用生物识别技术防范及处置影响社会稳定的案件和事件。生物识别技术发展迅速,在警务工作应用广泛。  相似文献   
443.
Modern identity is valuable, multi-functional and complex. Today we typically manage multiple versions of self, made visible in digital trails distributed widely across offline and online spaces. Yet, technology-mediated identity leads us into crisis. Enduring accessibility to greater and growing personal details online, alongside increases in both computing power and data linkage techniques, fuel fears of identity exploitation. Will it be stolen? Who controls it? Are others aggregating or analysing our identities to infer new data about us without our knowledge or consent? New challenges present themselves globally around these fears, as manifested by concerns over massive online data breaches and automated identification technologies, which also highlight the conundrum faced by governments about how to safeguard individuals' interests on the Web while striking a fair balance with wider public interests. This paper reflects upon some of these problems as part of the inter-disciplinary, transatlantic ‘SuperIdentity’ project investigating links between cyber and real-world identifiers. To meet the crisis, we explore the relationship between identity and digitisation from the perspective of policy and law. We conclude that traditional models of identity protection need supplementing with new ways of thinking, including pioneering ‘technical-legal’ initiatives that are sensitive to the different risks that threaten our digital identity integrity. Only by re-conceiving identity dynamically to appreciate the increasing capabilities for connectivity between different aspects of our identity across the cyber and the physical domains, will policy and law be able to keep up with and address the challenges that lie ahead in our progressively networked world.  相似文献   
444.
《Digital Investigation》2014,11(2):102-110
Anti-forensics has developed to prevent digital forensic investigations, thus forensic investigations to prevent anti-forensic behaviors have been studied in various area. In the area of user activity analysis, “IconCache.db” files contain icon cache information related to applications, which can yield meaningful information for digital forensic investigations such as the traces of deleted files. A previous study investigated the general artifacts found in the IconCache.db file. In the present study, further features and structures of the IconCache.db file are described. We also propose methods for analyzing anti-forensic behaviors (e.g., time information related to the deletion of files). Finally, we introduce an analytical tool that was developed based on the file structure of IconCache.db. The tool parses out strings from the IconCache.db to assist an analyst. Therefore, an analyst can more easily analyze the IconCache.db file using the tool.  相似文献   
445.
《Digital Investigation》2014,11(3):214-223
The research described in this paper proposes methods for visually interpreting the content of raw NAND flash memory images into higher level visual artefacts of assistance in reverse engineering and interpreting flash storage formats. A novel method of reverse engineering the structure and layout of individual memory locations within NAND flash images, based on injecting a known signal into a test NAND environment is also proposed. Omissions in the current theory of operation of flash, in particular the role of flash memory controllers in transforming the raw NAND are identified, clarifying the cause of variations seen between images taken using pseudo physical and raw physical techniques. The effectiveness of the approach is validated against raw NAND images from YAFFS2 based Android phones, taken via JTAG and chip-off methods.  相似文献   
446.
《Digital Investigation》2014,11(3):187-200
A recent increase in the prevalence of embedded systems has led them to become a primary target of digital forensic investigations. Embedded systems with DVR (Digital Video Recorder) capabilities are able to generate multimedia (video/audio) data, and can act as vital pieces of evidence in the field of digital forensics.To counter anti-forensics, it is necessary to derive systematic forensic techniques that can be used on data fragments in unused (unallocated) areas of files or images. Specifically, the techniques should extract meaningful information from various types of data fragments, such as non-sequential fragmentation and missing fragments overwritten by other data.This paper proposes a new digital forensic system for use on video data fragments related to DVRs. We demonstrate in detail special techniques for the classification, reassembly, and extraction of video data fragments, and introduce an integrated framework for data fragment forensics based on techniques described in this paper.  相似文献   
447.
Video file format standards define only a limited number of mandatory features and leave room for interpretation. Design decisions of device manufacturers and software vendors are thus a fruitful resource for forensic video authentication. This paper explores AVI and MP4-like video streams of mobile phones and digital cameras in detail. We use customized parsers to extract all file format structures of videos from overall 19 digital camera models, 14 mobile phone models, and 6 video editing toolboxes. We report considerable differences in the choice of container formats, audio and video compression algorithms, acquisition parameters, and internal file structure. In combination, such characteristics can help to authenticate digital video files in forensic settings by distinguishing between original and post-processed videos, verifying the purported source of a file, or identifying the true acquisition device model or the processing software used for video processing.  相似文献   
448.
Trust has been defined in many ways, but at its core it involves acting without the knowledge needed to act. Trust in records depends on four types of knowledge about the creator or custodian of the records: reputation, past performance, competence, and the assurance of confidence in future performance. For over half a century society has been developing and adopting new computer technologies for business and communications in both the public and private realm. Frameworks for establishing trust have developed as technology has progressed. Today, individuals and organizations are increasingly saving and accessing records in cloud computing infrastructures, where we cannot assess our trust in records solely on the four types of knowledge used in the past. Drawing on research conducted at the University of British Columbia into the nature of digital records and their trustworthiness, this article presents the conceptual archival and digital forensic frameworks of trust in records and data, and explores the common law legal framework within which questions of trust in documentary evidence are being tested. Issues and challenges specific to cloud computing are introduced.  相似文献   
449.
Increasing efforts are made by police forces all over the world to optimize the use of technology in policing and remove any obstacles as new and existing technologies provide new opportunities for law enforcement, criminal investigation and prosecution. This contribution describes results of research on which technologies are currently used at police forces and other criminal investigation organizations in the Netherlands, their experiences with these technologies and their needs and preferences in this regard. For existing opportunities the prevalence and satisfaction of several technologies in policing, including wiretapping, fingerprints, DNA research, database coupling, data mining and profiling, camera surveillance and network analyses were investigated. For new opportunities the most promising technologies (i.e., promising according to the police forces) were mapped. Furthermore, an inventory was made of the legal, technological and organizational obstacles police forces encounter when using different technologies for purposes like law enforcement, criminal investigation and prosecution.  相似文献   
450.
大数据技术在刑事定罪中的运用   总被引:1,自引:1,他引:0  
近年来,在金融创新特别是互联网金融创新大旗的指引下,网络现货投资交易平台迅速增长,因缺乏有效金融监管,现货投资交易平台引发的违法犯罪数量也随之暴增。由于网络现货投资交易行为的复杂性和专业性,司法机关查处网络现货投资交易平台中的犯罪时,在罪与非罪、此罪与彼罪判定方面分歧较大,传统的定罪方法和标准已经显得力不从心。大数据技术的出现为此类复杂犯罪定罪提供了方法与标准。大数据技术不仅能提高定罪准确性,也能提高定罪效率。针对当前出现的诸如网络虚拟投资交易案等网络犯罪特征,运用数据挖掘、决策树CHAID算法等数据技术对新型网络犯罪判决进行定量分析,我们可以将大数据技术作为司法定罪裁判的辅助工具,加以推广运用。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号