搜索资源列表
Forensic
- Forensic.zip不用再说了吧,快下吧,下罢
File+System+Forensic+Analysis
- File System Forensic Analysis is a good book to learn linux file system
Mobile-Agent-Technology-Code
- 《移动Agent技术》一书的所有章节源代码。-" Mobile Agent Technology" one book of all sections of the source code.
Oreilly.iPhone.Forensics
- 本书是关于iPhone编程的学习,因为是一个概论,所以我选择开发环境为CHM-This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!
Investigation_on_Model_Selection_Criteria_for_Spe
- Speaker recognition is the task of validating individual s identity using invariant features extracted from their voices print. Speaker recognition technology common applications include authentication, surveillance and forensic applications. This Pa
AntiForensicsCodeBreakers2006TranslationToEnglish
- An overview of anti-forensic techniques
ForensiDetectionofImageManipulationUsing
- Image Pixel Value mapping for Forensic images
bpn1
- This program to do recognition based on OPG images for forensic applications-This is program to do recognition based on OPG images for forensic applications
Forensic-Analysis-of-a-SQL-2005
- Forensic Analysis of a SQL Server 2005 Database Server 语言:英文 格式:pdf-Forensic Analysis of a SQL Server 2005 Database Server Format:pdf
mqzh
- 总结了数字图像盲取证技 术研究基础与发展方向,分别从数字图像取证理论模型、针对篡改手 段的真实性取证、针对隐密方法的完整性取证、基于图像自然属性的 原始性取证和隐密分析取证系统框架五个方面进行了研究 -Summary of digital image forensics technology research and development base, respectively, from the theoretical model of digital image forens
THE-EAR-AS-A-BIOMETRIC
- It is more than 10 years since the first tentative experiments in ear biometrics were conducted and it has now reached the “adolescence” of its development towards a mature biometric. Here we present a timely retrospective of the ensuing rese
spie10b
- Image Forensic Analyses that Elude the Human Visual System While historically we may have been overly trusting of photographs, in recent years there has been a backlash of sorts and the authenticity of photographs is now routinely questioned. B
COFEE-ORIGINAL-TORRENT
- COFEE全称为“计算机在线法庭科学证据提取器(Computer Online Forensic Evidence Extractor)”,是一款微软免费提供给国际刑警组织使用的证据提取工具,微软是这样描述的COFEE的:“有了COFEE,没有合适的计算机取证能力的执法机构可以轻松、可靠而且高效地收集现场证据。一个只有最基础的计算机知识的人也可以在不超过10分钟的时间里学会如何使用配置好的COFEE设备,执法人员可以像专家一样收集重要的犯罪证据,其复杂程度就像将USB插入计算机那样。”-COFE
Computer-forensics-Crime-scene-invest
- Network Forensic Crime scene Investigation Book
science_45
- The effect of mismatched recording conditions on human and automatic speaker recognition in forensic applications
forensic-and-anti-forensic--
- 取证与反取证 计算机取证就是运用软件技术和工具,照预定的步骤检查计算机系统和相关外部设备,保护、提取和分析计算机犯罪的痕迹,并产生具有法律效力的电子证据的过程。 反取证就是删除或者隐藏证据使取证调查无效。 -Forensics and anti-forensics Computer Forensics is the use of software technology and tools, according to the predetermined steps to check
EWF-Format
- 根据ASR02文档,EWF是Expert Witness Compression Format的简称。这个文件格式用来存储媒介镜像用于举证目的。它被广泛应用于计算机举证领域如EnCase en FTK。原是格式由ASRDATA提供用于SMART应用程序-EWF is short for Expert Witness Compression Format, according to [ASR02]. It is a file type used to store media images f
newjidianqi
- 本文利用编写的MATLAB软件结合解析法证,分析了一种新型的接地距离继电器在系统振荡时再发生单相经过渡电阻接地短路时的动作特性。该接地距离继电器的动作判据是通过比较故障后测得的母线电压、补偿电压、零序电流和负序电流四个量的相位关系以确定继电器的动作行为情况 -In this paper, written in MATLAB software analysis and forensic analysis of a new type of ground distance relays in th
Email-forensic
- 常常全面的一份电子邮件鉴别真伪的技术文章,希望对大家有所帮助。-Often fully the authenticity of an e-mail technical articles, we hope to help.
DICOM WATERMARKING
- Biometric based Information Forensic