• 主要包括静态取证动态取证网络取证

    It includes static evidence, dynamic evidence and net-work evidence.

    youdao

  • 计算机取证技术分为静态取证动态取证

    The computer forensic mainly consists of two techniques: the static forensic and dynamic forensic.

    youdao

  • 摘要计算机取证技术分为静态取证动态取证

    Absrtact: the computer forensic mainly consists of two techniques: the static forensic and dynamic forensic.

    youdao

  • 简单介绍动态取证系统(DFS)基本概念,指出了目前动态取证系统存在不足

    The concepts of dynamic forensics system (DFS) has been introduced, and the main weaknesses in current DFS has been pointed out.

    youdao

  • 该模型将入侵检测系统司法分析技术有机结合提出对计算机犯罪动态取证一定指导意义。

    Since it is the combo of IDS and justice parsing technique, it will be instructive for the dynamic forensics of computer crime.

    youdao

  • 论证入侵检测系统用于动态取证可行性之后,给出动态取证系统模型进行详尽的阐述。

    After reasoning the feasibility of adopting IDS into dynamic forensics, a dynamic forensics system model is presented and expounded in detail.

    youdao

  • 这些提高电子证据真实性有效性以及动态取证系统有效性、可适应性、可扩展性、智能化具有重要的意义

    These have meaning to raise the reality and efficiency of electronic evidence, it can raise efficiency, adaptability and extendibility of the dynamic forensics system too.

    youdao

  • 这些提高动态取证系统有效性、可适应性、可扩展性、智能化以及电子证据真实性、有效性具有重要的意义

    It has meaning to raise efficiency, adaptability and extendibility of the dynamic forensics system, it can raise the reality and efficiency of electronic evidence too.

    youdao

  • 实验表明能够保证数字证据真实性完整性有效性一个新的动态计算机取证方法

    The experiment shows that it is able to insure the authenticity, integrality and validity of the digital evidence, and it is a new method for dynamic computer forensics.

    youdao

  • 计算机取证技术当今一种热门动态安全技术采用主动出击方法搜集入侵证据,查出黑客来源有效地防范黑客入侵。

    Computer forensic is a dynamic security technology. It collects the proofs of intrusion and finds the source of hacker with the active methods, so it can prevent hacker intrusion effectively.

    youdao

  • 计算机取证技术当今一种热门动态安全技术采用主动出击方法搜集入侵证据,查出黑客来源有效地防范黑客入侵。

    Computer forensic is a dynamic security technology. It collects the proofs of intrusion and finds the source of hacker with the active methods, so it can prevent hacker intrusion effectively.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定