包含
forensics的中国译典句库查询结果如下:
属类:行业术语-中文论文标题-
属类:行业术语-中文论文标题-
属类:行业术语-中文论文标题-
属类:行业术语-中文论文标题-
属类:行业术语-中文论文标题-
属类:行业术语-中文论文标题-
属类:行业术语-中文论文标题-
属类:行业术语-中文论文标题-
属类:行业术语-中文论文标题-
属类:行业术语-中文论文标题-
属类:行业术语-中文论文标题-
属类:行业术语-中文论文标题-
属类:法学专业-美国法律-证据的本质
属类:时事政治-经济学人双语版-手机数据的滥用 两个发射塔
属类:时事政治-经济学人双语版-手机数据的滥用 两个发射塔
属类:时事政治-经济学人双语版-本周政治要闻
属类:时事政治-经济学人双语版-手机数据的滥用 两个发射塔
属类:时事政治-React趣味英语-趣味建议React 第237期:怎么让自已像夏洛克·福尔摩斯一样
属类:英汉句库-article.yeeyan.org-
属类:英汉句库-article.yeeyan.org-
属类:英汉句库-article.yeeyan.org-
属类:IT行业-www.ibm.com-
属类:中国大陆-ilib.cn-
属类:中国大陆-www.ceps.com.tw-
属类:IT行业-www.ibm.com-
属类:IT行业-www.ibm.com-
属类:中国大陆-www.ilib.cn-
属类:中国大陆-www.ilib.cn-
属类:中国大陆-www.ilib.cn-
属类:中国大陆-ilib.cn-
1 | 基于Linux的IM服务计算机取证系统研究 | Computer Forensics System for Instant Message Service Based on Linux | |
2 | 基于NTFS文件系统的计算机取证 | Computer Forensics Research and Implementation Based on NTFS File System | |
3 | 基于免疫Agent的计算机动态取证 | Dynamic Network Forensics Based on Immune Agent System | |
4 | 基于期望最大化算法的音频取证中的篡改检测 | Audio re-sampling Detection in Audio Forensics Based on EM Algorithm | |
5 | 基于人工免疫的网络入侵动态取证 | Dynamic Computer Forensics Based on Artificial Immune System Against Network Intrusion | |
6 | 基于入侵检测系统的主动取证方法 | Proactive Forensics Method Based on Intrusion Detection System | |
7 | 计算机取证课程实验教学探讨 | On the Experimental Teaching of Computer Forensics Course | |
8 | 可信计算环境中的数字取证 | Digital Forensics of Trusted Computing Environment | |
9 | 融合多源日志辅助取证的事件场景关联方法 | Fusing Heterogeneous Event Logs into Scenarios for Forensics | |
10 | 实时通信软件的计算机取证系统研究 | The Study of Computer Forensics System for Real Time Communication Soft | |
11 | 网络取证系统的技术分析与模型实现 | Technology Analysis and Model Implementation of Network Forensics System | |
12 | 信息取证中图像重采样检测 | Re-Sampling Detection in Information Forensics | |
13 | 在辩论学方面经受过一些训练 | Some training in forensics . | |
14 | ||1:Cherry Biometrics是一家位于弗吉尼亚州的取证公司。||2:该公司老板迈克尔·谢里证实,在20多个涉及发射塔证据的审判中,检察官误解了该项技术。||3:通常情况下,该技术只是确定手机连接上了附近的发射塔。||4:事实上,在同一个地方连续两次拨号有可能会连接两个不同的发射塔:一个是附近的,另一个可能是几英里远的。||5:谢里先生补充道,辩护律师有时会使用相同的“伪科学”技术来支持不在场证明。 | ||1:Cherry Biometrics, a Virginia forensics firm, has testified in more than 20 trials where tower evidence was being used.||2:In all of them, says Michael Cherry, the boss, prosecutors misunderstood the technology.||3:Often they would assert that mobile phones connect to the nearest tower.||4:In fact, two calls dialled consecutively from the same spot may connect to two different towers: one close by, the other many miles away.||5:Defence lawyers sometimes use the same “junk science” to support alibis, adds Mr Cherry. | |
15 | ||1:防止发射塔数据的滥用并不困难,但费用昂贵。||2:卫报数字取证局使用该项技术花费每小时250美元。||3:无罪释放罗伯茨小姐的法官责怪她的律师没能质疑手机证据,而这一证据本可以在陪审团那被推翻的。||4:现在她的律师已经死了。波特兰市联邦辩护律师办公室首席调查员William Teesdale抱怨鲁德·昂德希尔检察官就罗伯茨一案,并未提出罗伯茨小姐手机上事发的另一通电话,因为那一通电话有可能将罗伯茨定位在犯罪现场。||5:手机连接上了另一个不同的发射塔,这个塔离公园很远,而距离目击者看到罗伯茨小姐的地点很近。||6:检察官昂德希尔拒绝回应。 | ||1:Preventing the misuse of tower data should not be hard, though it can be expensive.||2:Guardian Digital Forensics charges $250 an hour for its expertise.||3:The judge who freed Ms Roberts faulted her lawyer, now dead, for failing to challenge mobile-phone evidence that would probably have collapsed before a jury.||4:William Teesdale, the chief investigator for Portland’s federal defender’s office, complains that the prosecutor, Rod Underhill, never addressed another call on Ms Roberts’s phone around the same time as the one that supposedly placed her at the murder scene.||5:It connected to a different tower, farther away from the park and closer to a spot where Ms Roberts had been seen by a witness.||6:Mr Underhill refused to comment. | |
16 | ||1:马航飞机被击落显然是由驻扎在乌克兰东部的乌克兰亲俄叛军造成的,该事件的发生改变了这起为期五个月的冲突双方局势。||2:该航班由阿姆斯特丹飞至吉隆坡, 于6月17日坠毁,造成298人死亡。||3:大部分遗体将由装有冷冻箱的火车运至有政府控制的哈尔科夫,并在跨国法医检验小组检验后运回荷兰。 | ||1:The shooting down of a Malaysia Airlines jet, apparently by pro-Russian rebels fighting Ukrainian troops in eastern Ukraine, changed the parameters of the five-month conflict.||2:The airliner was en route fromAmsterdam toKuala Lumpur; 298 people died when it crashed on July 17th.||3:Most of the bodies were eventually put onto a refrigerated train and transported to the government-controlled city ofKharkiv, where a multinational forensics team examined them before being flown back to theNetherlands. | |
17 | ||1:卫报数字取证的拉里·丹尼尔,在一本即将付梓的书中这样写道,....法庭上使用的大部分发射塔证据都是无效的。||2:丹尼尔先生已经帮助检察官和辩护律师做过近240次咨询工作,他发现其中有一半都有问题。||3:即使如此,发射塔的记录在法庭上还是有一席之地的,丹尼尔先生说,这些记录可以证明手机在宽广地区的移动情况,比如不相邻城市之间。 | ||1:Without it, much of the tower evidence presented in court is useless, writes Larry Daniel of Guardian Digital Forensics in a forthcoming book on the subject.||2:Mr Daniel has found errors in nearly half of the 240 consulting jobs he has done for prosecutors and defence lawyers.||3:Even so, tower records do have a place in court, says Mr Daniel: they can generally prove that a handset has moved between broad areas such as non-adjacent cities. | |
18 | 接受警察培训和法医培训等等。在你的脑海中假装你就是夏洛克·福尔摩斯。 | Take police training and forensics training and all that. In your mind, pretend that you’re being Sherlock Holmes. | |
19 | “他们(专家委员会)对于微生物法医学和情报部门未能告知的事情感到忧心忡忡,”史密森说道。 | "They were massively frustrated at what microbial forensics and intelligence didn’t tell them, " Smithson said. | |
20 | “我知道接下来我要在悉尼大学学法学了。”他说。 | "The next thing I knew I was studying forensics at Sydney University, " he says. | |
21 | 19.另一个进展来自食品科学。 | 19 Next up: food forensics . | |
22 | Helix是KnoppixLiveLinuxCD的一个自定义发行版,主要关注事件响应和取证工具。 | Helix is a customized distribution of the Knoppix Live Linux CD that focuses on incident response and forensics tools. | |
23 | LZW无损压缩算法在计算机取证中的应用研究 | Research on Application of LZW Lossless Compression Algorithm in Computer Forensics | |
24 | 本文对基于数据挖掘技术的计算机取证系统进行了探讨。 | Computer forensics system based on data mining technology is researched. | |
25 | 此外,还要考虑使用一个外部法律团队作为响应团队的一部分,以帮助确定赔偿金额。 | Also, consider having an outside forensics team as part of the response team to help assess damage. | |
26 | 从遭遇安全威胁的系统中搜集证据是计算机“取证”专家(数字时代的福尔摩斯)的工作。 | Collecting evidence from compromised systems is the job of computer forensics experts, the Sherlock Holmes of the digital age. | |
27 | 电子取证技术的发展与规范 | Development and Criterion of Computer Forensics Technology | |
28 | 电子数据取证研究概述 | Research of Requirement Based Computer Forensics Process | |
29 | 电子证物取证技术分析和系统实现 | Technical Analysis and System Realization of Electronic Evidence Forensics | |
30 | 分布式网络实时取证系统研究与设计 | Research and Design of a Distributed Network Real Forensics System |