期刊文献+

中文电子邮件作者的身份判别 被引量:2

Authorship identification of Chinese E-mail
下载PDF
导出
摘要 电子邮件已成为因特网上最基本、最重要的应用之一。但利用电子邮件进行诈骗、反动宣传等犯罪现象也日益严重。因此采用研究中文电子邮件作者身份挖掘的方法,以识别邮件作者的真实身份,为计算机取证提供依据。通过分析邮件作者的语言特征、结构特征和格式特征,利用支持向量机算法,自动把邮件文档分类到预定的作者类别中,并对有限数据集的试验取得了满意的结果。 E-mail has become one of the most important application on the lnternet. But, the phenomenon of utilizing e-mail to crime is serious day by day, such as antisocial mail, fraud mail, racketeering mail, terroristic threatening mail and so on. So the paper studies the method mining the Chinese E-mail author' s true identity, offers basis for Computer Forensics. We use various e-mail document features to classify authorship of emails such as structural characteristics, linguistic evidence and form characteristics with the Support Vector Machine as the learning algorithm. Experiments on a number of e-mail documents give promising results with some e-mail document features and author categories giving better categorization performance results.
出处 《河北农业大学学报》 CAS CSCD 北大核心 2006年第1期104-106,共3页 Journal of Hebei Agricultural University
基金 河北农业大学回国留学人员科研启动基金资助项目
关键词 身份识别 支持向量机 计算机取证 authorship identification SVM(Support Vector Machine) computer forensics
  • 相关文献

参考文献7

  • 1National fraud information center. Internet Fraud Statistics [EB/OL]. http://www.fraud.org/janjune2004ifw.htm, 2004 - 08 - 15.
  • 2广西互联网协会..电子邮件诈骗激增去年美国直接损失达12亿美元[EB/OL]..http://www.gxis.org.cn/hangyenews/2004news/news_2004050801.htm,,2004-05-08..
  • 3周光斌.我国垃圾邮件形势严峻加快治理双管齐下[N].通信信息报,2004-03-24.
  • 4OLIVIER DE VEL, ANDERSON A,CORNEY M, et al.Mining e-mail content for author identification forensics[J].ACM SIGMOD Record, 2001,30(4) :55-64.
  • 5阮绩智.电子邮件的文体特征探析[J].中国科技翻译,2002,15(3):34-37. 被引量:9
  • 6GUIFA TENG, MAOSHENG LAI, JIANBIN MA.Feature Extraction of Chinese E - mail Documents for Authorship Mining[A]. Proceedings of the Third International Conference on[C]. Japan. Published by International Information Institute, 2004. 419- 424.
  • 7GUIFA TENG, MAOSHENG LAI, JIANBIN MA, et al. E - mail authorship mining based on SVM for computer forensic[A]. Proceeding of 2004 International Conference on Machine Learning and Cybernetics [C].Shanghai, China, IEEE Systems, Man and Cybernetics Technical Committee on Cybernetics, 2004. 1204-1207.

二级参考文献2

共引文献9

同被引文献15

  • 1杜金榜.中文文本累积和分析技术[J].修辞学习,2004(6):8-12. 被引量:1
  • 2Burrows, J.F. Word-patterns and story-shapes:The statistical analysis of narrative style[J].Literary and Linguistic Computing,1987.61-70.
  • 3Fazlican, Patton, J.M. Change of Writing Style with Time[J].Computers and The Humanities,2004.61-82.
  • 4Guang Zhao,Ann L,Maclean, J.F. A comparison of canonical discriminant analysis and principal component analyisis for spectral transformation[J].Photogrammetric Engineering & Remote Sensing,2000.841-847.
  • 5Patrick Juola,Harald Baayen. A Controlled-Corpus Experiment in Authorship Identification by Cross-Entropy[EB/OL].http://www.guodao.cn:802/hdbsm/f.aspx,2009.
  • 6John Olsson. Forensic Linguistics: An introduction to language, crime, and the law[M].Great Britain:Antony Rowe Ltd,Chippenham,2004.
  • 7Malcolm Coulthard,Alison Johnson. An Introduction to Forensic Linguistics—language in evidence[M].London:routledge,2007.
  • 8Malcolm Coulthard. Author Identification, Idiolect,and Linguistic Uniqueness[J].Applied Linguistics,2004.431-447.
  • 9Tim Grant. Qualifying evidence in forensic authorship analysis[J].The International Journal of Speech Language and the Law,2007.1-25.
  • 10Tim Grant. Dimensions of Forensic Linguistics[M].John Benjamnins Publishing Co,2008.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部