期刊文献+

基于DBSCAN算法的电子邮件地址聚类系统

E-mail address clustering system based on DBSCAN arithmetic
下载PDF
导出
摘要 目前犯罪组织的严密性和隐蔽性日益增强,电子邮件的广泛应用更为犯罪分子的分散隐匿提供了便利条件。为了解决重点监控对象选择问题,设计了电子邮件地址聚类系统。系统根据电子邮件地址之间的收发关系,构建出电子邮件地址的相似度测量属性,利用基于密度聚类方法中的DBSCAN算法,对电子邮件地址关系紧密程度进行划分,找出较为活跃的电子邮件地址,缩小了电子邮件地址查阅范围,提高了电子邮件信息分析处理的针对性和有效性。 Strictness and concealment of criminality community is strengthening.Because the criminality members' intentionality com-municates with each other by E-mail,E-mail becomes a convenient means to keep their decentralization and hiding.An E-mail address cluster system is brought forward.According to the receiving and sending's contact of E-mail addresses,system creates E-mail address's attribute of similarity measure,then use DBSCAN algorithm,which is the one of density-based clustering methods,to classify E-mail by degree of E-mail address's contact,and find out the active E-mail addresses.The process minish the scopes of E-mail address that should be examined.The pertinence and validity of Email analysis are improved.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第6期1401-1404,共4页 Computer Engineering and Design
关键词 数据挖掘 聚类 密度 电子邮件 DBSCAN算法 data mining clustering density e-mail DBSCAN arithmetic
  • 相关文献

参考文献9

  • 1Christian Bird,Alex Gourley, Prem Devanbu,et al.Mining email social networks[C].Shanghai, China: ICSE Proceedings of the 2006 International Workshop on Mining Software Repositories, 2006:137-143.
  • 2Marshall van Alstyne,Zhang Jun.Emailnet:A system for automatically mining social networks from organizational email communication[R].Pittsburgh:NAACSOS,2003.
  • 3Adam J O'Donnell, Walter C Mankowski, Jeff Abrahamson.Using email social network analysis for detecting unauthorized accounts [C]. Mountain View, California USA: CEAS Proceedings of the Third Conference on Email and AntiSpam, 2006: 152-156.
  • 4唐常杰,刘威,温粉莲,乔少杰.社会网络分析和社团信息挖掘的三项探索——挖掘虚拟社团的结构、核心和通信行为[J].计算机应用,2006,26(9):2020-2023. 被引量:24
  • 5乔少杰 唐常杰 于中华 等.基于属性筛选支持向量机挖掘虚拟社团结构[J].计算机科学,2005,32(7):208-208.
  • 6Dzeroski S. Multi-reletional data mining: an introduction [J].ACM SIGKDD Explorations Newsletter,2003,5(1): 1-16.
  • 7Ferrman L C.Graphic techniques for exploring social network data[C].Carrington P J, Scott J,Wasserman S. Models and Methods in Social Network Analysis,2005:248-269.
  • 8Hail J W, Kamber M.Data mining: Concepts and techniques[M]. San Francisco,CA:Morgan Kaufmatm Publishers,2000.
  • 9梁力,严建伟,聂影.基于源地址约束的垃圾邮件过滤模型[J].西安交通大学学报,2005,39(4):376-379. 被引量:3

二级参考文献25

  • 1RFC 821-1982,Simple mail transfer protocol[S].
  • 2RFC1939-1996, Post office protocol V3[S].
  • 3Yang X Y, Zhu L, Zeng M. An architecture design for IP traffic engineer [A]. The Third International Asia-Pacific Web Conference, Xi′an, China,2000.
  • 4Agrawal R, Srikant R.Fast algorithms for mining association rules [R]. Research Report, RJ9839. San Jose, USA: IBM Almaden Research Center, 1994.
  • 5LIBEN-NOWELL D, KLEINBERG J. The Link Prediction Problem for Social Networks[A]. Proc. 12th International Conference on Information and Knowledge Management (CIKM) [ C], 2003.
  • 6DOMINGOS P, RICHARDSON M. Mining the Network Value of Customers[ A]. Proceedings of the Seventh International Conference on Knowledge Discovery and Data Mining[ C]. San Francisco, CA:ACM Press, 2001.57-66).
  • 7DOMINGOS P. Mining Social Networks for Viral Marketing[ J].IEEE Intelligent Systems, 2005.20(1).
  • 8CHAKRABARTI S, DOM B, GIBSON D, et al. Mining the link structure of the World Wide Web[ J]. IEEE Computer, 1999, 32(8).
  • 9XU JJ, CHEN HC. CfimeNet Explorer:. A Framework for Criminal Network Knowledge Discovery[ J]. ACM Transactions on Information Systems, 2005, 23(2).
  • 10BERKOWITZ SD . An Introduction to Structural Analysis : The Net work Approach to Social Research[ M]. Burrerworth, Toronto,1982.

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部