用計算機犯罪 的英文怎麼說
中文拼音 [yòngjìsuànjīfànzuì]
用計算機犯罪
英文
computer crimes- 用 : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
- 計 : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
- 算 : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
- 機 : machineengine
- 犯 : Ⅰ動詞1 (抵觸; 違犯) go against; offend; violate 2 (侵犯) attack; violate; work against 3 (發...
- 罪 : Ⅰ名詞1 (犯法的行為) crime; guilt 2 (過失) fault; misconduct; blame; wrongdoing 3 (苦難; 痛苦...
- 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
- 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
- 犯罪 : commit a crime [an offense]: 犯罪的中止 desistance from offense; 犯罪和青少年犯罪 crime and delin...
-
Facial representation and recognition is one of the key issues in pattern recognition, computer vision, and image understanding fields. it is widely applied to numerous commercial and law areas, such as mug shots retrieval, real - time video surveillance, security system and so on
人臉的表示和識別技術是模式識別、計算機視覺和圖像理解系統的研究熱點之一,在公安和安全部門有著廣泛的應用,例如搜索罪犯、動態監視、銀行密碼系統等。A solution is proposed to apply the traditional criminal profiling method to digital evidence analysis research. based on association rule data mining technique, a method called cb - pide was designed. this method can focus on the investigating space and dig out the potential abnormal behavior
本文將傳統犯罪取證研究中的犯罪輪廓構建技術的基本思想和方法應用計算書l取證方法關鍵問題研究于計算機犯罪證據分析的研究中,提出電子數據證據犯罪行為輪廓( criminalbehavio : profilinginnigitalevidenee ,簡稱cb一pide )分析方法。Network forensics is an important extension to present security infrastructure, and is becoming the research focus of forensic investigators and network security researchers. however many challenges still exist in conducting network forensics : the sheer amount of data generated by the network ; the comprehensibility of evidences extracted from collected data ; the efficiency of evidence analysis methods, etc. against above challenges, by taking the advantage of both the great learning capability and the comprehensibility of the analyzed results of decision tree technology and fuzzy logic, the researcher develops a fuzzy decision tree based network forensics system to aid an investigator in analyzing computer crime in network environments and automatically extract digital evidence. at the end of the paper, the experimental comparison results between our proposed method and other popular methods are presented. experimental results show that the system can classify most kinds of events ( 91. 16 ? correct classification rate on average ), provide analyzed and comprehensible information for a forensic expert and automate or semi - automate the process of forensic analysis
網路取證是對現有網路安全體系的必要擴展,已日益成為研究的重點.但目前在進行網路取證時仍存在很多挑戰:如網路產生的海量數據;從已收集數據中提取的證據的可理解性;證據分析方法的有效性等.針對上述問題,利用模糊決策樹技術強大的學習能力及其分析結果的易理解性,開發了一種基於模糊決策樹的網路取證分析系統,以協助網路取證人員在網路環境下對計算機犯罪事件進行取證分析.給出了該方法的實驗結果以及與現有方法的對照分析結果.實驗結果表明,該系統可以對大多數網路事件進行識別(平均正確分類率為91 . 16 ? ) ,能為網路取證人員提供可理解的信息,協助取證人員進行快速高效的證據分析Organized crime has discovered that computers can be used just like legitimate business people use them, but for illegal purposes
犯罪團伙發現,可以像合法的商業人員一樣使用計算機,但為了非法的目的。However, the politics and law institutions lack such necessary high - tech support to attain the most extensive electronic evidence of the computer - related crimes to penalize the offenders. in order to enhance the abilities of attacking computer - related offences, we need to conduct a profound study on the field of computer forensics, which is related to the computer forensics technology in question and requires not only the development of effective forensics tools, but also the research on its definition, standards, proceedings and some other basic theories
如何最大限度地獲取計算機犯罪相關的電子證據,將犯罪分子繩之以法,政法機關在利用高技術手段對付這種高技術犯罪方面缺乏必要的技術保障和支持,為了提高打擊計算機犯罪的能力,需要對計算機取證領域進行深入的研究,這不但需要開發切實有效地取證工具,更需要對計算機取證領域的取證定義、取證標準、取證程序等理論基礎進行研究,其中涉及的技術就是目前人們研究和關注的計算機取證技術。With the development of information technologies, the criminal cases whose tool or goal is computer system are increasing
摘要隨著信息技術的發展,利用計算機系統作為犯罪工具或目標的案件越來越多。The concept of " cybercrime " differs from " computer crime ", its content could be divided into two categories : cybercrime in narrow sense ( i. e., crimes for computer network ) and cybercrime in broad sense ( i. e., crimes by computer network ), the former is basically consistent in the crime features of several crimes in present criminal law of china, the main problem is defining and resisting of cracker behavior
「網路犯罪」的提法與「計算機犯罪」有相同之處,也有重要的區別。對網路犯罪的內容,本文傾向于區分為對網路的犯罪和用網路實施的犯罪兩種。前者基本上與我國現行刑法規定的幾個罪名的犯罪構成相一致,這方面目前較主要的難題是對黑客行為的界定和處理。Log is am important file created and preserved by computer system, in which it well keeps the record of e - criminal - trail thus providing crucial clues and evidence sources for computer crime cracking
日誌是計算機系統產生並保留的一份重要文件,它記錄著犯罪者利用計算機進行犯罪的大量「痕跡」 ,是打擊計算機犯罪非常重要的線索和證據來源。Sparks of this paper are as follows : 1 ) a much improved security audit log is presented, which supports log file in main systems and ensures orginal log files before system intruding happens are protected from being tampered or deleted so that they can be saved completely to be used as investigation clues and evidence souces of great importance ; 2 ) a log file base including different kinds of log files is established to support log file collecting and analyzing ; 3 ) correlation analysis is applied to effectively identify latent clues
本文的創新點在於: 1 )提出了一種較為完善的支持計算機取證的安全審計日誌方法,它可以支持目前常見系統的日誌文件,確保系統被入侵攻擊前的日誌文件記錄不被篡改、刪除,使得入侵者在入侵攻擊系統前留下的「痕跡」能被完整的記錄下來,作為取證人員重要的調查線索和證據來源; 2 )對各類系統不同日誌文件組成日誌文件庫,為獲取和分析日誌文件的記錄提供支持; 3 )對各類日誌文件的記錄採用關聯分析,更有效的提取潛在的計算機犯罪線索。On the basis of exploring the various conceptions the writer redefined computer crime and set forth a new and original view as follows : " computer crime is the behavior of the person who brings serious harm to society by using computer as a tool and by using the technology of computer information and specialized knowledge to illegally to encroach on the safety of computer and its network
在探討各式概念的基礎上,對計算機犯罪概念重新作了界定,提出了自己獨到的見解。認為「計算機犯罪是行為人利用計算機信息技術和專門知識,以計算機為工具,非法侵害計算機及其網路安全的嚴重危害社會的行為。 」Like employees, these authorized users may obtain confidential passwords or find other ways of committing computer crimes
像雇員一樣,這些授權的用戶可能獲取秘密口令,或者找到進行計算機犯罪的其他途徑。Combining with the four factors of computer crimes investigation and the ralation models, this article illustrates the comprehensive application of computer evidence gathering and processing in criminal detection through a successful typical case
文章結合計算機犯罪調查四因素及其關系模型,通過一個成功的典型案例來說明計算機證據獲取、分析技術在案件偵破中的綜合應用,以供參考。Computer forensics demands that problem concerned with computer crime investigation should be treated from the aspects of law and technique : make the most use of and develop the current data obtaining technique and data - analyzing technique, discover data related to computer crime, ensure and relativity between fact and evidence ; quicken law developments, establishment computer evidence " s law position ; obtain the evidence according to the legal procedure, and insure the legitimacy of evidence obtaining ; establish the accurate storing system both from management and from technique, enhancing the investigation and judgment of computer evidence, and ensuring the dependability of computer evidence
計算機取證就需要從法律和技術兩個角度來看待計算機犯罪偵查方面的一些問題:充分運用和發展現有的數據獲取技術和數據分析技術,發掘與計算機犯罪相關的證據,確保證據與犯罪事實的相關性;加快法律建設,確立計算機證據的法律地位;依照法定程序獲取證據,確保證據取得的合法性;建立一個從管理和技術上都可靠的保管鏈,加強對計算機證據的科學嚴密的審查判斷,保證計算機證據的真實可靠性。With the development of computer technology and the prevalent network, people are exposed to frequent occurrence of crimes committed by or aimed at computers
隨著計算機技術的發展和網路的普及,利用或以計算機為目標的犯罪事件頻繁發生。The significance of regulation factor in the precaution against the official crime by computer
論制度因素在預防計算機職務犯罪中的重要作用To check the network crime, the author put forward proposal of lowering age for penalty and increasing unit crime in the light of that which tendency of low age is more apparent and unit crime arise too many, introducing strict liability in view of that which intentional or disintentional network crime is discriminated difficultly. to meet preventive needs, criminal law should alter result crime to dangerous or behaviour crime. because objective essentialia negotii of network crime is distinct from traditional crime, criminal law should replenish two criminal articals : crime of stealing computer network ; crime of providing computer network
該部分提出了應對網路犯罪的一系列刑法對策,針對網路犯罪主體的低齡化趨勢明顯和單位犯罪大量出現的問題,提出了就網路犯罪要陽氏相對負刑事責任年齡和增設單位網路犯罪的主張;針對網路犯罪罪過的過失與故意的難辯性,提出要引進嚴格責任的歸責原則;對客觀要件上的特殊哇,主張前置打擊力度,將網路犯罪由結果犯設置為危險犯或者行為犯;最後在客體要件上,依據客體侵犯的是復雜j客體,提出要增加竊用計算機網路服務罪和提供計算機網路犯罪等罪名。During the period of designing we connect quantitative analysis with qualitative analysis, science with human nature. in the same time, we gain the opportunity to apply the system by the computer
該設計實現定性與定量相結合的、科學化與人性化相結合的犯罪預測和成因分析系統,並給出計算機應用平臺。分享友人