恭维 发表于 2025-3-23 11:11:47

Digital Forensics and Cyber Crime978-3-319-14289-0Series ISSN 1867-8211 Series E-ISSN 1867-822X

Angioplasty 发表于 2025-3-23 15:20:35

https://doi.org/10.1007/978-3-319-14289-0Algorithms; Cloud Computing; Computer Forensics; Cybercrime; Data Recovery; File Carving; File System Secu

我怕被刺穿 发表于 2025-3-23 21:00:04

978-3-319-14288-3Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014

慢慢冲刷 发表于 2025-3-24 02:16:11

http://reply.papertrans.cn/28/2794/279317/279317_14.png

SENT 发表于 2025-3-24 04:34:14

http://reply.papertrans.cn/28/2794/279317/279317_15.png

Gentry 发表于 2025-3-24 09:35:40

http://reply.papertrans.cn/28/2794/279317/279317_16.png

DOLT 发表于 2025-3-24 11:50:50

http://reply.papertrans.cn/28/2794/279317/279317_17.png

SSRIS 发表于 2025-3-24 15:18:57

http://reply.papertrans.cn/28/2794/279317/279317_18.png

Colonnade 发表于 2025-3-24 21:02:40

http://reply.papertrans.cn/28/2794/279317/279317_19.png

Addictive 发表于 2025-3-25 01:44:06

António Fragoso,Edmée Ollagnierseful information about users of a drive, a definition which applies to most criminal investigations. Matching file hash values to those in published hash sets is the standard method, but these sets have limited coverage. This work compared nine automated methods of finding additional uninteresting
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Digital Forensics and Cyber Crime; Fifth International Pavel Gladyshev,Andrew Marrington,Ibrahim Baggili Conference proceedings 2014 Insti