LAIR 发表于 2025-3-23 13:05:55

http://reply.papertrans.cn/15/1479/147809/147809_11.png

运动的我 发表于 2025-3-23 15:49:04

http://reply.papertrans.cn/15/1479/147809/147809_12.png

食道 发表于 2025-3-23 19:33:01

http://reply.papertrans.cn/15/1479/147809/147809_13.png

Semblance 发表于 2025-3-23 23:15:47

http://reply.papertrans.cn/15/1479/147809/147809_14.png

新鲜 发表于 2025-3-24 04:52:40

http://reply.papertrans.cn/15/1479/147809/147809_15.png

压倒 发表于 2025-3-24 10:34:02

Wenyi Gu,Nigel McMillan,Chengzhong Yuwork may be implemented in a tool for conducting trust-based forensic investigations. The model takes into account the trust environment and parameters that influence interactions in a computer network being investigated. Also, it allows for crimes to be reenacted to create more substantial evidentiary proof.

填料 发表于 2025-3-24 12:47:05

http://reply.papertrans.cn/15/1479/147809/147809_17.png

Critical 发表于 2025-3-24 14:53:27

http://reply.papertrans.cn/15/1479/147809/147809_18.png

不能妥协 发表于 2025-3-24 21:33:20

https://doi.org/10.1007/0-387-36891-4BIOS Chips; CFA Interpolation; Data Concealment; Data Mining; Disk Imaging; Evidence; Forensic; Management;

镇压 发表于 2025-3-25 02:00:05

978-1-4419-4232-6IFIP International Federation for Information Processing 2006
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Advances in Digital Forensics II; Martin S. Olivier,Sujeet Shenoi Conference proceedings 2006 IFIP International Federation for Informatio