Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Knowledge and Technology》 2010-28
Add to Favorite Get Latest Update

Simple Discussion of Computer Forensics

LIU Wen-jian (Computer Department of SICHUAN Normal University, Chengdu 610101, China)  
With computer and network becoming the more important role in social, political, economy and cultural areas as well as bringing the high-efficient work and high-speed communication, crime phenomenon of it are also increasing day by day. Being an important means of anti-crime and defeat-crime, CF raised hot topics in fields of computer science and science of law. An introduction of Computer Forensics and its substances are made in the paper first. By comparing the research history and actual state of CF home and broad and summarizing frequently-used models of CF, the potential problems of CF's are submitted, an outlook of CF's development direction have been made in the last part of the article and also.
【CateGory Index】: TP399-C2
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 3 Hits
1 CHEN Long~(1,2),WANG Guo-yin~1(1.Institute of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,P.R.China;2.State Key Laboratory of Information Security,Institute of Software of Chinese Academy of Sciences,Beijing 100080,P.R.China);Survey of computer forensics[J];重庆邮电学院学报(自然科学版);2005-06
2 WANG Ling1,2,3+, QIAN Hua-Lin1 1(Computer Network Information Center, The Chinese Academy of Sciences, Beijing 100080, China) 2(Institute of Computing Technology, The Chinese Academy of Sciences, Beijing 100080, China) 3(Graduate School, The Chinese Academy of Sciences, Beijing 100039, China);Computer Forensics and Its Future Trend[J];软件学报;2003-09
3 Xu Rongsheng Wu Haiyan Liu Baoxu(Computing Center,Institute of High Energy Physics,CAS,Beijing100039);Computer Forensics Introduction[J];计算机工程与应用;2001-21
Chinese Journal Full-text Database 9 Hits
1 JIN Bo;YANG Tao;WU Song-yang;HUANG Dao-li;GUO Hong;Key Laboratory of Information Network Security,the Third Research Institute of Ministry of Public Security;;Review of Digital Forensics[J];中国司法鉴定;2016-01
2 Tang Jun;Mingda Vocational and Technical College;;Computer forensics technology and development direction[J];佳木斯职业学院学报;2015-10
3 XIA Rong;Shanghai Public Security Bureau;;Research and Application on Web Forensic Analysis Technology[J];信息网络安全;2015-09
4 XIANG Zhen;Sichuan Engineering Technical College;;Analysis on the Forensic Technology of Conceal Information of Computer Mainframe[J];价值工程;2015-06
5 Wang Yi;Gao Bo;Yu Xiaodong;;Check the Mobile Information Device security technology research[J];自动化与仪器仪表;2014-06
6 ZHAO Bin;QU Huifang;The Department of Computer Science,Jining University;School of Software Engineering,Beijing University of Technology;;Android-oriented Mobile Devices Data Forensics Technology[J];济宁学院学报;2014-03
7 LIU Wen-jian;Computer Department of SICHUAN Police College;;Implementation of one Keyboard-Event-Based Computer Forensics Process Modle[J];科技创新导报;2014-17
8 Yan Jie;Changchun Finance College;;A Reverse Forensic Algorithms Based on the Carrier Check Mark Area[J];科技通报;2013-12
9 WANG Qun;LI Fu-juan;Department of Science and Technology,Jiangsu Police Institute;;Construction of Computer Forensics Technology Laboratory[J];实验室研究与探索;2013-10
Similar Journals
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved