期刊文献+

一种基于键盘事件计算机取证过程模型的实现

Implementation of one Keyboard-Event-Based Computer Forensics Process Modle
在线阅读 下载PDF
导出
摘要 该文简述了计算机取证技术及反取证技术对计算机取证结果的影响,结合动态、静态取证技术及常规证据提取技术,利用修改后的法律执行过程模型画出了基于键盘事件提取的取证过程流程图并将其实现。 In the paper, simple introduction of Computer Forensics and influences of Computer Anti-forensics are made,And then, A Keyboard-Event-Based forensic process flow chart according to the revised law enforcement process model combining with dynamic and static forensic technology and conventional evidence extraction technology has been drawn out.
作者 刘文俭
出处 《科技创新导报》 2014年第17期37-37,共1页 Science and Technology Innovation Herald
关键词 计算机取证 计算机反取证 常用取证模型 取证流程图 Computer forensics Computer Anti-forensics Common forensics model Forensics flowchart
  • 相关文献

参考文献5

二级参考文献43

  • 1蒋中云,张基温.基于Multi-Agent的网络入侵取证模型的设计[J].微计算机信息,2005,21(12X):46-48. 被引量:4
  • 2grugq.Defeating forensic analysis on Unix. Phrack #59 article6.http://www.phrack.org/show.phpp=59a=6,2002.
  • 3Farmer D.What are MACtimes Dr. Dobb''s Journal.http://www.ddj.com/documents/s=880/ddj0010f/0010f.htm,2000,10.
  • 4Farmer D Venema W.The coroner''''s toolkit (TCT). Dan Farmer Wietse Venema.http://www.fish.com/tct/,2002.
  • 5grugq scut.Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 article5.http://www.phrack.org/show.phpp=58a=5,2001.
  • 6Oseles L.Computer forensics: The key to solving the crime.http://facuity.ed.umuc.edu/-meinkej/inss690/oseles_2.pdf,2001.
  • 7ParraM.Computer forensics.http://www.giac.org/practical/Moroni_Parra_GSEC.doc,2002.
  • 8Dittrich D.Basic steps in forensic analysis of Unix systems.http://staff.washington.edu/dittrich/misc/forensics/,2000.
  • 9http://wwwaccessdatacom/
  • 10http://wwwcdpicom/

共引文献253

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部