...(National Computer Security Center) 子网掩码 (Netmask) 网络加密 (Network Encryption) 网络探究 (Network Forensics) 网络映射 (Network Mapping) 网络周界 (Network Perimeter) 网络扫描 (Network Scanning) 网络嗅探 (Network Sniffing)...
基于28个网页-相关网页
...識(Computer Forensics)、硬体鉴識 (Hardware Forensics )、软体鉴識(Software Forensics)及网路鉴識(Network Forensics)等(如 图三),故举凡与數位资料有关之鉴識皆属之, 故提出數位鉴識之观念。
基于8个网页-相关网页
computer network forensics 计算机网络取证
network forensics system 网络取证系统
dynamic network forensics 动态取证
network forensics analysis tool 网络取证工具
network crime forensics 网络犯罪取证
Therefore, exploring an effective detection and trace back method has important theoretical significance and practical value in network trace, network forensics and fighting against network crime.
因此,探索出行之有效的网络异常检测与溯源方法,对网络追踪、网络取证、打击网络犯罪,具有重要的理论意义和现实意义。
参考来源 - 网络异常检测与溯源方法研究·2,447,543篇论文数据,部分数据来源于NoteExpress
以上来源于: WordNet
A proactive network forensics system based on agents was designed and implemented in this paper.
针对数字证据特点和网络取证要求,设计实现了一种基于代理的主动型网络取证系统。
Network forensics turns the passive investigation after events to the active defense before events.
网络取证把入侵发生后的被动调查转为事件发生之前的主动防御。
Analyzing computer crime through forensics and anti-forensics, we should find out the origin of anti-forensics to protect national information network security and beat crime.
从取证与反取证两方面分析计算机犯罪的特征,研究反取证技术的根源,可有效地保护国家信息网络安全,打击犯罪。
应用推荐