粗野 发表于 2025-3-25 07:20:50

https://doi.org/10.1007/978-3-030-61675-5Cybercrime; Forensic investigation; Cyber forensics; Crime investigation; Data mining; Classification; Clu

Dorsal-Kyphosis 发表于 2025-3-25 11:16:15

http://reply.papertrans.cn/63/6206/620587/620587_22.png

睨视 发表于 2025-3-25 15:28:58

978-3-030-61677-9The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl

收集 发表于 2025-3-25 17:15:54

http://reply.papertrans.cn/63/6206/620587/620587_24.png

栏杆 发表于 2025-3-25 21:02:55

http://reply.papertrans.cn/63/6206/620587/620587_25.png

牲畜栏 发表于 2025-3-26 03:53:56

http://reply.papertrans.cn/63/6206/620587/620587_26.png

强所 发表于 2025-3-26 07:45:10

http://reply.papertrans.cn/63/6206/620587/620587_27.png

Frequency 发表于 2025-3-26 10:40:29

http://reply.papertrans.cn/63/6206/620587/620587_28.png

环形 发表于 2025-3-26 13:47:23

http://reply.papertrans.cn/63/6206/620587/620587_29.png

monogamy 发表于 2025-3-26 20:15:40

Analyzing Network Level Information,itical business communications, or agreements. When a crime is committed, it is always possible for the perpetrator to manipulate e-mails or any electronic evidence, forging the details to remove relevant evidence or tampering the data to mislead the investigator. Possible manipulation of such evide
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Machine Learning for Authorship Attribution and Cyber Forensics; Farkhund Iqbal,Mourad Debbabi,Benjamin C. M. Fung Book 2020 The Editor(s)