期刊文献+

监控文本文件内容变化的文本比较算法 被引量:12

Text comparison algorithm for detecting content change in text files
下载PDF
导出
摘要 为了判断文本文件的内容是否发生变化,确定变化的内容,并尽量降低系统开销,提出了一种基于位置的文本文件比较算法。算法利用位置优先原则,简化了比较过程。实验结果表明该算法可以应用于文件监控,而且易于理解。 In order to know whether the content of a text file is modified and determine what is changed, while making the system spend as small as possible, an algorithm based on locality was presented. Because of the locality priority, the process was simplified. The experiment results show that this algorithm which is easy to understand can be used for file detection.
出处 《计算机应用》 CSCD 北大核心 2010年第A01期133-134,142,共3页 journal of Computer Applications
关键词 文件监控 信息安全 文本比较算法 文本文件 篡改 file detection information security text comparison algorithm text file interpolation
  • 相关文献

参考文献11

二级参考文献27

  • 1方航锋,汪海航.日志提取分析系统的设计和实现[J].计算机工程,2004,30(14):108-109. 被引量:5
  • 2周立萍,陈平.逆向工程发展现状研究[J].计算机工程与设计,2004,25(10):1658-1660. 被引量:17
  • 3Zheng Wang,S M,Ken Pierce.Bmat -a binary matching tool[Z].2nd ACM Workshop on Feedback-Directed Optimization,1999.
  • 4Brenda S Baker,Udi Manber.Compressing differences of executable code[Z].ACMSIGPLAN Workshop on Compiler Support for System Software (WCSS),1999.
  • 5Halvar Flake.Structural comparision of executable objects[Z].2004.
  • 6DataRescue.IDA pro disassembler[EB/OL].http://www.datarescue.com/idabase.
  • 7Kris Coppieters.A cross-platform binary diff[Z].Dr.Dobb's Journal,1995.
  • 8"VERICEPT identifies information leaking to the competition".http://international.visa.com/av/alliances/sai/alliances/pdf/vericept_case1.pdf.
  • 9"矛与盾的较量-CRC原理篇".http://www.ddvip.net/program/masm/index4/34.htm.
  • 10Rajni S Goel."Techniques for detecting malicious or improper data modifications".Dissertation Abstracts International,Volume:64-02,Section:B,page:0807.Directors:Sushil Jajodia;Daniel Barbara.

共引文献13

同被引文献109

引证文献12

二级引证文献138

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部