用計算機犯罪 的英文怎麼說

中文拼音 [yòngsuànfànzuì]
用計算機犯罪 英文
computer crimes
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : machineengine
  • : Ⅰ動詞1 (抵觸; 違犯) go against; offend; violate 2 (侵犯) attack; violate; work against 3 (發...
  • : Ⅰ名詞1 (犯法的行為) crime; guilt 2 (過失) fault; misconduct; blame; wrongdoing 3 (苦難; 痛苦...
  • 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
  • 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
  • 犯罪 : commit a crime [an offense]: 犯罪的中止 desistance from offense; 犯罪和青少年犯罪 crime and delin...
  1. Facial representation and recognition is one of the key issues in pattern recognition, computer vision, and image understanding fields. it is widely applied to numerous commercial and law areas, such as mug shots retrieval, real - time video surveillance, security system and so on

    人臉的表示和識別技術是模式識別、視覺和圖像理解系統的研究熱點之一,在公安和安全部門有著廣泛的應,例如搜索、動態監視、銀行密碼系統等。
  2. A solution is proposed to apply the traditional criminal profiling method to digital evidence analysis research. based on association rule data mining technique, a method called cb - pide was designed. this method can focus on the investigating space and dig out the potential abnormal behavior

    本文將傳統取證研究中的輪廓構建技術的基本思想和方法應書l取證方法關鍵問題研究于證據分析的研究中,提出電子數據證據行為輪廓( criminalbehavio : profilinginnigitalevidenee ,簡稱cb一pide )分析方法。
  3. Network forensics is an important extension to present security infrastructure, and is becoming the research focus of forensic investigators and network security researchers. however many challenges still exist in conducting network forensics : the sheer amount of data generated by the network ; the comprehensibility of evidences extracted from collected data ; the efficiency of evidence analysis methods, etc. against above challenges, by taking the advantage of both the great learning capability and the comprehensibility of the analyzed results of decision tree technology and fuzzy logic, the researcher develops a fuzzy decision tree based network forensics system to aid an investigator in analyzing computer crime in network environments and automatically extract digital evidence. at the end of the paper, the experimental comparison results between our proposed method and other popular methods are presented. experimental results show that the system can classify most kinds of events ( 91. 16 ? correct classification rate on average ), provide analyzed and comprehensible information for a forensic expert and automate or semi - automate the process of forensic analysis

    網路取證是對現有網路安全體系的必要擴展,已日益成為研究的重點.但目前在進行網路取證時仍存在很多挑戰:如網路產生的海量數據;從已收集數據中提取的證據的可理解性;證據分析方法的有效性等.針對上述問題,利模糊決策樹技術強大的學習能力及其分析結果的易理解性,開發了一種基於模糊決策樹的網路取證分析系統,以協助網路取證人員在網路環境下對事件進行取證分析.給出了該方法的實驗結果以及與現有方法的對照分析結果.實驗結果表明,該系統可以對大多數網路事件進行識別(平均正確分類率為91 . 16 ? ) ,能為網路取證人員提供可理解的信息,協助取證人員進行快速高效的證據分析
  4. Organized crime has discovered that computers can be used just like legitimate business people use them, but for illegal purposes

    團伙發現,可以像合法的商業人員一樣使,但為了非法的目的。
  5. However, the politics and law institutions lack such necessary high - tech support to attain the most extensive electronic evidence of the computer - related crimes to penalize the offenders. in order to enhance the abilities of attacking computer - related offences, we need to conduct a profound study on the field of computer forensics, which is related to the computer forensics technology in question and requires not only the development of effective forensics tools, but also the research on its definition, standards, proceedings and some other basic theories

    如何最大限度地獲取相關的電子證據,將分子繩之以法,政法關在利高技術手段對付這種高技術方面缺乏必要的技術保障和支持,為了提高打擊的能力,需要對取證領域進行深入的研究,這不但需要開發切實有效地取證工具,更需要對取證領域的取證定義、取證標準、取證程序等理論基礎進行研究,其中涉及的技術就是目前人們研究和關注的取證技術。
  6. With the development of information technologies, the criminal cases whose tool or goal is computer system are increasing

    摘要隨著信息技術的發展,利系統作為工具或目標的案件越來越多。
  7. The concept of " cybercrime " differs from " computer crime ", its content could be divided into two categories : cybercrime in narrow sense ( i. e., crimes for computer network ) and cybercrime in broad sense ( i. e., crimes by computer network ), the former is basically consistent in the crime features of several crimes in present criminal law of china, the main problem is defining and resisting of cracker behavior

    「網路」的提法與「」有相同之處,也有重要的區別。對網路的內容,本文傾向于區分為對網路的網路實施的兩種。前者基本上與我國現行刑法規定的幾個名的構成相一致,這方面目前較主要的難題是對黑客行為的界定和處理。
  8. Log is am important file created and preserved by computer system, in which it well keeps the record of e - criminal - trail thus providing crucial clues and evidence sources for computer crime cracking

    日誌是系統產生並保留的一份重要文件,它記錄著者利進行的大量「痕跡」 ,是打擊非常重要的線索和證據來源。
  9. Sparks of this paper are as follows : 1 ) a much improved security audit log is presented, which supports log file in main systems and ensures orginal log files before system intruding happens are protected from being tampered or deleted so that they can be saved completely to be used as investigation clues and evidence souces of great importance ; 2 ) a log file base including different kinds of log files is established to support log file collecting and analyzing ; 3 ) correlation analysis is applied to effectively identify latent clues

    本文的創新點在於: 1 )提出了一種較為完善的支持取證的安全審日誌方法,它可以支持目前常見系統的日誌文件,確保系統被入侵攻擊前的日誌文件記錄不被篡改、刪除,使得入侵者在入侵攻擊系統前留下的「痕跡」能被完整的記錄下來,作為取證人員重要的調查線索和證據來源; 2 )對各類系統不同日誌文件組成日誌文件庫,為獲取和分析日誌文件的記錄提供支持; 3 )對各類日誌文件的記錄採關聯分析,更有效的提取潛在的線索。
  10. On the basis of exploring the various conceptions the writer redefined computer crime and set forth a new and original view as follows : " computer crime is the behavior of the person who brings serious harm to society by using computer as a tool and by using the technology of computer information and specialized knowledge to illegally to encroach on the safety of computer and its network

    在探討各式概念的基礎上,對概念重新作了界定,提出了自己獨到的見解。認為「是行為人利信息技術和專門知識,以為工具,非法侵害及其網路安全的嚴重危害社會的行為。 」
  11. Like employees, these authorized users may obtain confidential passwords or find other ways of committing computer crimes

    像雇員一樣,這些授權的戶可能獲取秘密口令,或者找到進行的其他途徑。
  12. Combining with the four factors of computer crimes investigation and the ralation models, this article illustrates the comprehensive application of computer evidence gathering and processing in criminal detection through a successful typical case

    文章結合調查四因素及其關系模型,通過一個成功的典型案例來說明證據獲取、分析技術在案件偵破中的綜合應,以供參考。
  13. Computer forensics demands that problem concerned with computer crime investigation should be treated from the aspects of law and technique : make the most use of and develop the current data obtaining technique and data - analyzing technique, discover data related to computer crime, ensure and relativity between fact and evidence ; quicken law developments, establishment computer evidence " s law position ; obtain the evidence according to the legal procedure, and insure the legitimacy of evidence obtaining ; establish the accurate storing system both from management and from technique, enhancing the investigation and judgment of computer evidence, and ensuring the dependability of computer evidence

    取證就需要從法律和技術兩個角度來看待偵查方面的一些問題:充分運和發展現有的數據獲取技術和數據分析技術,發掘與相關的證據,確保證據與事實的相關性;加快法律建設,確立證據的法律地位;依照法定程序獲取證據,確保證據取得的合法性;建立一個從管理和技術上都可靠的保管鏈,加強對證據的科學嚴密的審查判斷,保證證據的真實可靠性。
  14. With the development of computer technology and the prevalent network, people are exposed to frequent occurrence of crimes committed by or aimed at computers

    隨著技術的發展和網路的普及,利或以為目標的事件頻繁發生。
  15. The significance of regulation factor in the precaution against the official crime by computer

    論制度因素在預防職務中的重要作
  16. To check the network crime, the author put forward proposal of lowering age for penalty and increasing unit crime in the light of that which tendency of low age is more apparent and unit crime arise too many, introducing strict liability in view of that which intentional or disintentional network crime is discriminated difficultly. to meet preventive needs, criminal law should alter result crime to dangerous or behaviour crime. because objective essentialia negotii of network crime is distinct from traditional crime, criminal law should replenish two criminal articals : crime of stealing computer network ; crime of providing computer network

    該部分提出了應對網路的一系列刑法對策,針對網路主體的低齡化趨勢明顯和單位大量出現的問題,提出了就網路要陽氏相對負刑事責任年齡和增設單位網路的主張;針對網路過的過失與故意的難辯性,提出要引進嚴格責任的歸責原則;對客觀要件上的特殊哇,主張前置打擊力度,將網路由結果設置為危險或者行為;最後在客體要件上,依據客體侵的是復雜j客體,提出要增加竊網路服務和提供網路名。
  17. During the period of designing we connect quantitative analysis with qualitative analysis, science with human nature. in the same time, we gain the opportunity to apply the system by the computer

    該設實現定性與定量相結合的、科學化與人性化相結合的預測和成因分析系統,並給出平臺。
分享友人