Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering and Applications》 2001-21
Add to Favorite Get Latest Update

Computer Forensics Introduction

Xu Rongsheng Wu Haiyan Liu Baoxu(Computing Center,Institute of High Energy Physics,CAS,Beijing100039)  
With the development of information technologies,electronic evidence is becoming a new type of legal evi-dence.As a frontier science,Computer Forensics is now the focus of research and attention.This paper briefly describes the definition,history,main principles and common steps of computer forensics,as well as the related techniques and tools.It concludes by showing the future directions of computer forensics.
【Fund】: 中国科学院知识创新工程重大项目基金(编号:KJCX1-09);; 珠海中科网安公司计算机取证课题基金的资助
【CateGory Index】: TP399;D915.13
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 10 Hits
1 WU Lei1,LIU Yan-hua1,XU Rong-sheng1,2 (1.College of Mathematics and Computer Science of Fuzhou University,Fuzhou 350002,China;2.Institute of High Energy Physics,Chinese Academy of Sciences,Beijing 100039,China);A Novel Power Information System Proactive Defense Model[J];Journal of Electric Power;2008-05
2 LIU Wen-jian (Computer Department of SICHUAN Normal University, Chengdu 610101, China);Simple Discussion of Computer Forensics[J];Computer Knowledge and Technology;2010-28
3 Miao Deyu,Kang Xuebin,Xiao Xinguang(Beijing Antiy Electronic Equipment Co.,Ltd.,Beijing 100084,China);Analysis and Forensics of Malware in Suspicious Computer Based on Four Class Trust Model[J];Telecommunications Science;2011-01
4 REN Rong(Department of Information Technology,Dazhou Vocational and Technical College,Dazhou Sichuan 635000,China);On the Technique of Data Restoration in Hard Disk[J];Sichuan University of Arts and Science Journal;2009-05
5 ZHAO Qian 1 ,CAO Tian-jie 1 ,GENG Tao 2 (1.China University of Mining & Technology, Xuzhou 221116,P.R.China; 2. Xuzhou Municipal Public Security Bureau, Xuzhou 221008,P.R.China);Discussion on Computer Forensics[J];Computer Security;2008-08
6 ZHANG Chu, ZHANG Fan. China University of Politics Science and Law, Beijing, 100088;Research on Several Issues in Network Forensics.[J];Evidence Science;2007-Z1
7 FAN Tong-ke(Computator Center,Xi’ an International University,Xi’an 710077,China);A dynamic fornsics method based on immune network intrusion[J];Electronic Design Engineering;2010-06
8 HUANG Ning-ning~1,SU Hong-fan~2(1.Command Center,Nanning Bureau of Public Security,Nanning,Guangxi,530012,China;2.Traffic Police Detachment,Nanning Bureau of Public Security,Nanning,Guangxi,530028,China);Analysis on Key Techniques of Forensic Computing System[J];Journal of Guangxi Academy of Sciences;2006-04
9 Wang Tun (Department of Computer,Chang Zhi College ShanxiChangzhi 046011; College of Computer Science and Technology,Taiyuan University of Technology ShanxiTaiyuan 030024);Timestamp Forensic Research Based on Linux[J];Information Security and Technology;2013-06
10 LI Xiang,FAN Yu-mei(School of Mathematics and Physics,University of Science and Technology Beijing,Beijing 100083,China);Forensic Investigation Based on Secret Sharing and Digital Signature[J];Computer Knowledge and Technology;2013-17
China Proceedings of conference Full-text Database 2 Hits
1 HUANG Ning-ning, SU Hong-fan (Command Center, Nanning Bureau of Public Security,Nanning,Guangxi, 530012,China; Traffic Police Detachment, Nanning Bureau of Public Security, Nanning, Guangxi, 530028, China);Analysis on Key Techniques of Forensic Computing System[A];[C];2006
2 BAI Hai-tao,LIU Guang-jian ( Postgraduate Team 1,Institute of Command and Control of PLA Univercity of SCI and Tech, NanJing 210007,China PLA 63888 army ,Ji Yuan 454650,China);Actuality Analysis And Develepment Research Of DigitalForensic Based On Networking[A];[C];2006
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 CAO Yuan da, HE Hai jun, TU Zhe ming (Dept. of Computer Science and Engineering, Beijing Institute of Technology, Beijing100081, China);Design and Implementation of a Chinese Web Documents Full-Text Retrieval System[J];Journal of Beijing Institute of Technology;2002-01
2 CAO Hong-ze~1,LIU Qiang~2(1.IT Centre of National Audit Office,P.R.C.,Beijing 100830,China;2.Operation Centre of China Development Bank,Beijing 100037,China);Online Auditing and Its Key Technologies[J];Transactions of Beijing Institute of Technology;2006-07
3 CHEN Wei,LIU Si-feng,QIU Guang-hua(College of Economics and Management,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China);A Data Processing Method Based on Outlier Detection in IT Audit[J];Commercial Research;2006-17
4 CHEN Long~(1,2),WANG Guo-yin~1(1.Institute of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,P.R.China;2.State Key Laboratory of Information Security,Institute of Software of Chinese Academy of Sciences,Beijing 100080,P.R.China);Survey of computer forensics[J];Journal of Chongqing University of Posts and Telecommunications;2005-06
5 CHEN Long,ZHOU Jian,WANG Guo-yin(Institute of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,P.R.China);Fusing heterogeneous event logs into scenarios for forensics[J];Journal of Chongqing University of Posts and Telecommunications(Natural Science);2007-05
6 CHEN Long,TAN Xiang-lin,GAO Ru-dai(Institute of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,P.R.China);Research on intelligent forensics technology[J];Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition);2009-04
7 HU Liang, KANG Jian, ZHAO Kuo,MENG Fan-er (College of Computer Science and Technology, Jilin University,Changchun 130012,China);Intrusion detection systems[J];Journal of Changchun Post and Telecommunication Institute;2002-04
8 HU Liang,WANG Wen-bo,ZHAO Kuo(College of Computer Science and Technology,Jilin University,Changchun 130012,China);Summary of Computer Forensics[J];Journal of Jilin University(Information Science Edition);2010-04
9 YOU Chunhui,LIU Naiqi,DAI Lisong(Computer School,University of Electronic Science and Technology of China,Chengdu 610054,China);Data Reconversion in Computer Forensics System[J];Journal of Chengdu University(Natural Science Edition);2008-02
10 Cui Song(Chengdu Medical College, Sichuan Chengdu, 610081);The Design and Realization of a Data Recovery System Based on Windows FAT[J];Journal of Chengdu College of Education;2006-04
【Secondary References】
Chinese Journal Full-text Database 10 Hits
1 DU Jiang,WANG Shi-dong(Dept.of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,P.R.China);Research on technology of data recovery in computer forensics[J];Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition);2010-05
2 HU Liang,WANG Wen-bo,ZHAO Kuo(College of Computer Science and Technology,Jilin University,Changchun 130012,China);Summary of Computer Forensics[J];Journal of Jilin University(Information Science Edition);2010-04
3 Zhang Jian Wang Shoukuan Du Luowen;The Technology of Data Recovery[J];Computer Study;2007-04
4 REN Ya-zhou (Dept. of Information Science and Technology,Shandong Institute of Political Science and Law,Jinan 250014,China);Research on Computer Forensics[J];Computer Knowledge and Technology;2008-22
5 WANG Feng-lan (Shangqiu Medical College,Shangqiu 476100,China);On the Hard Disk Data Recovery[J];Computer Knowledge and Technology;2009-34
6 LIU Wen-jian (Computer Department of SICHUAN Normal University, Chengdu 610101, China);Simple Discussion of Computer Forensics[J];Computer Knowledge and Technology;2010-28
7 CAO Ji-dong(Department of Computer Science & Technology,Shaanxi University of Technology,Hanzhong 723001,China);The Research of Computer Forensics Technology Based on Physical Memory of Windows System[J];Computer Knowledge and Technology;2011-27
8 Wang Yi (Department of Information Science and Technology,East China University of Political Science and Law,Shanghai 201620,China);Study on Cell Phone Forensic Standardization[J];Telecommunications Science;2010-S2
9 He Yue1,2,Han Suohua2,Liu Shujin2,Zhao Lei2(1.Computer Science and Technology Department,China University of Petroleum,Beijing 102200,China;2.The People's Procuratorate in Changping District of Beijing,Beijing 102200,China);Electronic Evidence Authentication Technologies and Specifications[J];Telecommunications Science;2010-S2
10 REN Rong(Department of Information Technology,Dazhou Vocational and Technical College,Dazhou Sichuan 635000,China);On the Technique of Data Restoration in Hard Disk[J];Sichuan University of Arts and Science Journal;2009-05
China Proceedings of conference Full-text Database 4 Hits
1 CHEN Junbiao Shang Hai HongKou municipal people's prosecution service,200082;The Conviction and Penalty of Hacker Activity[A];[C];2008
2 XIA Bing~(1,3),LI Xiang-dong~(1,3),ZHENG Qiu-sheng~(1,3),WANG Zhi-qi~2 (1.Zhongyuan University of Technology,Zhengzhou Henan 450007,China;2.Department of Public Security of Henan Province,Zhengzhou Henan 450002,China;3.Engineering Laboratory of Information System Security Assessment of Henan Province,Zhengzhou Henan 450007,China);Analysis of Depth Assessment of Information System Security Technology[A];[C];2013
3 LIANG Xiao (The First Branch of Beijing Municipal People's Procuratorate,Beijing 100040,China);The Construction of Trustworthiness Evaluation System of Electronic Data in Criminal Lawsuits[A];[C];2013
4 WEN Wen~1,HUANG Shu-hua~2 (1.Beijing Public Security Bureau Dongcheng Branch,Beijing 100011,China; 2.People's Public Security University of China,Beijing 100038,China);The Preliminary Research on Several Difficult Issues of Amendment to Computer Crimes on Criminal Law[A];[C];2013
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved