Pillory 发表于 2025-4-1 02:26:36

http://reply.papertrans.cn/28/2794/279320/279320_61.png

CLOUT 发表于 2025-4-1 08:21:45

http://reply.papertrans.cn/28/2794/279320/279320_62.png

纯朴 发表于 2025-4-1 11:21:17

http://reply.papertrans.cn/28/2794/279320/279320_63.png

不可比拟 发表于 2025-4-1 17:33:54

Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpusected given the corpus). Cluster comparison performed best at providing useful information for an investigator, but the other methods provided unique additional information albeit with a significant number of false alarms.
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Digital Forensics and Cyber Crime; Third International Pavel Gladyshev,Marcus K. Rogers Conference proceedings 2012 ICST Institute for Com