forensics

forensics

1. ISEAGE will be used to model attacks on key infrastructure in cyberspace, and could help improve computer defense and forensics.

ISEAGE可以成为在网路空间上面攻击的模式也可以帮助电脑防护与辨识.的工作.

2. Research on Application of LZW Lossless Compression Algorithm in Computer Forensics

LZW无损压缩算法在计算机取证中的应用研究

3. A Security Audit System for E-commerce Using Multi-layer Forensics

一种多层取证的电子商务安全审计系统

4. The Centre*s work encompasses all aspects of informationtechnology and law, including computerisation of legal information on the Internet, intellectual property and computer forensics.

中心的工作包括信息技术与法律领域的研究,包括互联网合法信息的计算机化,知识产权与计算机实验室。

5. In order to solve data recovery problems in computer forensics,this paper proposes a new algorithm based on NTFS.

为解决计算机取证的数据恢复问题,提出了一种基于新技术文件系统(New technology file system,NTFS)的数据恢复算法.

6. proactive forensics

主动取证

7. post-mordem forensics

事后取证

8. In fact, with thousands of investigations under our belt, we cover the entire spectrum of computer forensics and digital crime.

事实上,通过在我们的地带进行上千次的调查研究,我们已经掌握了所有电脑取证和数字犯罪的特征。

9. DE]Suchmaschinen Foren - Die Professionelle Pagerank Und Suchmaschinen Site.

人均页读数:Page Views per user for [SUCHMASCHINENFOREN.

10. Blind CFA interpolation detection, which identifies the demosaicing method used in digital camera by analyzing output images, provides an efficient tool for digital image forensics.

从数字图像中盲检测数码相机采用的CFA插值算法,可以为数字图像取证提供重要的技术手段。

11. Once an abused and abandoned child, Dexter is now a successful forensics pathologist...but lurking just beneath his charismatic personality is a terrible truth.

他从小饱受虐待和折磨,一位迈阿密警察收养了他。如今他也成为了迈阿密警局一名成功的法医。

12. But acquiring this kind of evidence, that is computer forensics, is a big problem to us.

但对于这类证据的取得,即计算机犯罪取证,却是人们要面对的一个难题。

13. But according to the document, FBI forensics indicate that he did write them and did put them there.

但是根据法庭文件,FBI辩称确实是此人书写了这些材料,也是他放在那里的。

14. But, over 100 years ago two disciplines came together entomology3 , the study of insects, and forensics, the scientific analysis of crime.

但是,在100多年前,研究昆虫的昆虫学和科学分析犯罪的法医学这两个学科走到了一起。

15. in academia, where some forensics programs are growing exponentially;

例如教育机构,有些鑑识学程的注册人数,增长率得以指数表示;

16. Keyword: computer forensics;

关 键 词: 计算机取证;

17. Keywords :network forensics;

关键词: 网络取证;

18. distributed dynamic forensics

分布式动态取证

19. Research and Design of a Distributed Network Real Forensics System

分布式网络实时取证系统研究与设计

20. Head Forensics Management

剖析法证管理主任

21. computer dynamJc forensics

动态取证

22. Even identical twins have unique autoantibody profiles,' the same cannot be said/or DNA. How might this affect the future of forensics?

即使是同卵双生的双胞胎也具有独特的自身形象,同时很难讲/或者说是DNA。这如何可能影响到法医的未来?

23. forensics agent

取证代理

24. Forensics Analysis

取证分析

25. Forensics tools

取证工具

26. status of forensics

取证状态

27. forensics science

取证科学

28. forensics system

取证系统

29. forensics behavior model

取证行为模型

30. You use message tracking logs for message forensics, mail flow analysis, reporting, and troubleshooting.

可使用邮件跟踪日志进行邮件检查、邮件流分析、报告和故障排除。

31. Trusted forensics

可信取证

32. Forensics experts said Golik likely died in 1973, about the time a neighbor last saw her.

周五警方说,没有任何人报告过古丽克的失踪,也没有人来认领她的尸体。

33. image forensics

图像取证

34. In 2006, Gilbert said, Kathy's body was exhumed in search of further clues, but authorities were unable to obtain forensics from the remains.

在2006年,她的尸体被挖掘出来,以期找到新的线索,但是当局没能从残尸中找到证据。

35. After analyzing the development of digital forensics and its defects,the article studies the reliability of digital forensics and its system.

在分析电子数据取证的发展及其存在问题的基础上,对电子数据取证有效性理念及其体系进行了研究。

36. The use of scientific knowledge in legal cases is called forensics,

在司法案件中使用的科学认识叫做法医学,

37. “UTM is the first higher learning institution to take steps to help the Royal Malaysian Police in forensics.

在工艺大学吉隆坡分校与大学副校长(国际事务与学术)茜蒂哈米莎博士签署合作备忘录,双方同意提升合作培养更多鑑证科人才。

38. During school, he participated in numerous electives, including forensics, basketball, and drama.

在校期间,他选修了众多课程,包括辩论术、篮球和戏剧。

39. On the base of requirement, combining with the ideas of software engineering, a dynamic network intrusion forensics process model based on evidence competency was explored.

在此基础上,结合软件工程的思想,从获取证据的需求出发,提出了一个基于入侵检测的网络证据获取过程模型。

40. Some training in forensics.

在辩论学方面经受过一些训练

41. Some training in forensics;

在辩论学方面经受过一些训练;

42. Computer Forensics Research and Implementation Based on NTFS File System

基于NTFS文件系统的计算机取证

43. Real-time intrusion reconstruction system of computer forensics based on event correlation

基于事件关联的电子取证实时入侵重构

44. Intrusion reconstruction system of computer forensics based on fuzzy reasoning with weights

基于加权模糊推理的电子取证入侵重构系统

45. Wang X., Wu J., Niu P.. A New Digital Image Watermarking Algorithm Resilient to Desynchronization Attacks. IEEE Transactions on Information Forensics and Security, 2007, 2(4): 655-663. (SCI, EI

基于局部不变特征的强鲁棒数字音频水印技术研究,60873222,国家自然科学基金项目,2009年1月-2011年12月,主持

46. Research of a Platform for Network Forensics on Data Fusion and Data Mining

基于数据融合和数据挖掘技术的网络取证体系的研究

47. Perfecting Judicial Forensics System to Promote the Building of a Harmonious Society

完善司法鉴定制度促进和谐社会构建

48. real-time forensics

实时取证

49. real-time forensics model

实时取证模型

50. In order to fetch evidences effectively and insure their originality and validity, a new method for dynamic computer forensics is presented.

实验表明,该模型能有效地对多种攻击进行实时证据的提取,具有自适应性、分布性、实时性等优点,是动态计算机取证的一个较好解决方案。

51. We are looking for software or IT firms in Sichuan to form a partnership in providing database forensics - retrieving deleted data using special software.

寻找四川的软件、IT公司建立合作伙伴关系,提供数据库辩论术,利用特殊的软件来恢复已删除的数据。

52. Attorney Mark Geragos says the family of actor David Carrodine is asking the FBI and a private forensics expert to help investigate the actor's death.

导演马克表示演员大卫的家属要求FBI和一私人法医专家调查大卫的死因。

53. Nina pulls Jamey off decoding the key card to help forensics on the unidentified body.

尼娜将杰米调离解码那张钥匙卡的工作,来帮助法医们确认那具无名尸体的身份。

54. And could help improve computer defense and forensics.

帮忙电脑防护以及辨别技术.

55. A management phase provides ongoing support to monitor the organization and provide augmentation services for emergency response, threat analysis and forensics in the event of a breach.

并开始与初步安全评估,以了解地方须修复,设计阶段,以制定一项全面的安全战略,并决定如何利用新的硬件和软件,可以实施。

56. Chinese J Foren Med. 1995;10:193-195.(Abstract in English

引用文献为中文且英文摘要时,应特别注明“全文为中文”,

57. This powerful Forensics software product has all of the power previous versions of DC LIVE/Forensics but with some major new features!

快速处理:改进了动态滤波器和连续滤波器等中的算法,从而使处理速度提高了20-80%;

58. Keywords intelligence treatment;data-mining;nonmonotonic reasoning;case-based reasoning;hypothesis cognition;command decision-making;forensics analysis;

情报处理;数据挖掘;非单调推理;案例推理;假设识别;指挥决策;取证分析;

59. Mobile Phone Forensics

手机取证

60. printer forensics

打印机取证

61. This study applied the investigation techniques of Environmental Forensics to examine the sources of volatile organic compounds (VOCs) in Houjing River.

摘要:本研究利用环境法医学之调查技巧,进行后劲溪水中VOC污染来源之探讨。

62. In computer forensics's data recovery and convention data recovery, it has used the same principle, but it has its own some characteristic request and the technology realizes the method.

摘要计算机取证中的数据恢复与常规数据恢复虽然利用了相同的原理,但是有其自身的一些特点要求及技术实现方法。

63. Evidences used for computer forensics are usually distributed in heterogeneous event logs.Fusing heterogeneous event logs into scenarios is meaningful for aiding computer forensics.

摘要计算机取证牵涉的证据通常分布在多种不同的日志中,从多源日志进行事件场景关联对于辅助取证意义重大。

64. Design and Implementation of IDS Supporting Computer Forensics

支持计算机取证的入侵检测系统的设计与实现

65. digital forensics

数字取证

66. digital image forensics

数字图像取证

67. blind image forensics

数字图像盲取证

68. Log files analysis is the important contain of system security inspect, and log files is the primarily evidence of computer forensics.

日志文件分析是系统安全检测的重要内容;同时日志文件也是计算机取证的重要依据。

69. Is a customized distribution of the Knoppix Live Linux CD that focuses on incident response and forensics tools.

是Knoppix Live Linux CD的一个自定义发行版,主要关注事件响应和取证工具。

70. intelligent forensics

智能取讧

71. Online_Games_Forum Diskussionsforum rund um browserbasierende Spiele. Hier sind die offiziellen Foren von einigen Online-Spielen zuhause.

曼联周刊含曼联新闻速递,红魔星光,超级评论,周刊论坛。

72. Data minging is applied in the data analysis of the model. The sparks of this model are follows: The model, which is designed in light of the procedure of digital forensics, is integrated.

本文在总结了国内外对数字取证研究的基础上,结合数字取证的过程,设计了一种数字取证模型,并把数据挖掘技术应用到了该模型的数据分析当中。

73. Computer forensics system based on data mining technology is researched.

本文对基于数据挖掘技术的计算机取证系统进行了探讨。

74. In the paper, an effective acquring technique of dynamic digital evidence based on intrusion detection is proposed, which incorporates intrusion detection and computer forensics.

本文将入侵检测技术结合到计算机取证技术中,提出一个基于入侵检测技术的动态证据识别与获取方法。

75. "irtual autopsy" performed with multidetector computed tomography (MDCT) can aid forensics teams in determining if a person has drowned, according to a study published in the June issue of Radiology.

根据放射学杂志6月刊的一项研究发现,在多层螺旋CT的辅助下虚拟尸检可以帮助取证小组判断死者是否为溺死。

76. forensics expert

法医专家

77. Forensics may lead them to the answers.

法医或许可以帮助他们找出真相。

78. Versitech Ltd and Shandong Computer Science Center signs an agreement to further develop DESK: A Multilingual Computer Forensics Software

港大与山东省计算中心签署合作协议研发数鉴电脑鉴证软件

79. Then there's also the legality of taking action against a hacker who has compromised a machine, after all the heavy forensics are done.

然后还有对已经损害一台机器的一位黑客采取行动的合法性,终究沉重的辩论学被做。

80. The field of image forensics will, however, continue to make it harder and more time-consuming (but never impossible) to create a forgery that cannot be detected.

然而,影像鑑识科学虽然永远不可能杜绝几可乱真的假照片,却可以持续使假照片的制作越来越困难,且更花时间。

英语宝典
考试词汇表