Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Shanxi Electronic Technology》 2019-02
Add to Favorite Get Latest Update

New Development of Computer Forensics Technology in the Age of Big Data

Liu Sanman;Liu Hehua;Shanxi Police College;Taiyuan University;  
The article points out that the big data has become the operating basis resource of the whole society which are changing the people's production,life and the way of thinking. It analyzes six main methods and techniques of computer forensics in big data's time: data collision,data mining,data,network analysis,hot spot analysis. This paper points out that there will be more and more network and information security incidents and crimes involving information network in the future. Computer forensics will face many new technologies and problems,which will promote the constant development and application for computer forensics in theory,technology,tools and standards.
【Fund】: 山西省“1331工程”重点学科建设计划项目资助(1331KSC);; 山西警察学院创新团队建设计划项目资助;; 2018年山西省科技厅软科学项目资助(2018041054)
【CateGory Index】: TP311.13;D918.2
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 1 Hits
1 Li Yan;Liu Nian;Zhang Bin;Yuan Kai-guo;Yang Yi-xian;Information Security Center,Beijing University of Posts and Telecommunications;Beijing Electronic Science and Technology Institute;China Information Security Certification Center;;Image Multiple Copy-move Forgery Detection Algorithm Based on Reversed-generalized 2 Nearest-neighbor[J];电子与信息学报;2015-07
【Secondary Citations】
Chinese Journal Full-text Database 3 Hits
1 Wang Qing;Zhang Rong;Department of Electronic Engineering and Information Science, University of Science and Technology of China;Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences;;Exposing Digital Image Forgeries Based on Double Quantization Mapping Relation of DCT Coefficient[J];电子与信息学报;2014-09
2 NIU Shaozhang;MENG Xianzhe;CUI Haoliang;Beijing Key Lab of Intelligent Telecommunication Software and Multimedia, Beijing University of Posts and Telecommunications;;Digital Image Forensics Using Orthogonal 1-D Objects[J];Chinese Journal of Electronics;2014-03
3 WU YunJie;DENG Yu;DUAN HaiBin;ZHOU LinNa;Science and Technology on Aircraft Control Laboratory, BeiHang University;Department of Electronics Engineering, Tsinghua University;Beijing Institute of Electronics Technology and Application;;Dual tree complex wavelet transform approach to copy-rotate-move forgery detection[J];Science China(Information Sciences);2014-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved