期刊文献+

基于贝叶斯过滤的反垃圾邮件技术 被引量:1

Anti-Spam Technology Based on Bayesian Fiter
下载PDF
导出
摘要 介绍了垃圾邮件的现状,以及目前常见的反垃圾邮件的方法。针对贝叶斯算法的特点,介绍使用贝叶斯过滤的方法实现垃圾邮件的过滤技术。 This paper firstly introduces the actuality of spam, and the common anti-spam methods. Then based on the feature of bayesian algorithm, The paper introduces the use of the bayesian filter to filtrate spam.
作者 熊志勇
出处 《软件导刊》 2010年第9期163-165,共3页 Software Guide
关键词 垃圾邮件 贝叶斯过滤 训练过程 邮件分类 Spam Bayesian Filter Training Process Mail Classification
  • 相关文献

参考文献3

二级参考文献12

  • 1查亚兵.仿真共用技术概述[R]..2002年度军用仿真专业组会议[C].,2002..
  • 2Ian Foster, Carl Kesselman, Steven Tuecke. The Anatomy of the Grid [ EB/OL]. http://www. globus. org/research/papers/anatomy. pdf, 2002.
  • 3Ann Chervenak, Ian Foster, et al. The Data Grid: Towards an Architecture for the Distributed Management Analysis Large Scientific Datasets [ EB/OL]. http:// www. globus. org/documentation/incoming/datagrid. pdf, 2002.
  • 4Karl Cazajkowski, Ian Fostor, et al. A Resource Management Architecture for Metacomputing Systems [EB/OL]. http://www. isi. edu/~ karlcz/papers/gram97. pdf, 2002.
  • 5David F Ferraiolo, Ravi Sandhu, Serban Gavrila, et al. Proposed NIST Standard for Role-based Access Control[ J ]. ACM Trans on Information and System Security, 2001,4(3) :224-274.
  • 6Ian Foster, Carl Kesselman, Jeffrey M. GAd Services for Distributed System Integration [ EB/OL]. http://www. globus. org/research/papers/ieee- cs- 2. pdf, 2002.
  • 7S M Bellovin.Security Problems in the TCP/IP Protocol Suite[ J ].Computer Communication Review,1989,19 (2):32-48.
  • 8L Pearlman,V Welch,I Foster,et al.A Community Authorization Service for Group Collaboration[ EB/OL].http://www.globus.org/research/papers/CAS_2002_Submitted.pdf,2002-02/2003-04.
  • 9Frank Siebenlist,et al.OGSA Security Roadmap Global Grid Forum Specification Roadmap towards a Secure OGSA [ EB/OL].http://www.gridforum.org/meetings/ggf6/ggf6 _wg_papers/draft-ggf-ogsasec-roadmap-01.doc ,2002-10/2003 -04.
  • 10Mary R Thompson,et al.CA-based Trust Model for Grid Authentication and Identity Delegation [ EB/OL].http://www.gridforum.org/meetings / ggf6 / ggf6_wg_papers/IBM/TrustModel-v6c.pdf,2002-10/,2003 -04.

共引文献12

同被引文献7

  • 1王希忠,曲丽君,张国印.电子邮件认证技术[J].信息技术,2006,30(5):114-116. 被引量:1
  • 2黄晓菁.信息污染中垃圾邮件的处理对策[J].科技情报开发与经济,2007,17(12):238-239. 被引量:2
  • 32011年第一季度中国反垃圾邮件状况调查报告[EB/OL].http://www.anti.spam.cn/ShowArticle.php?id=11129.
  • 4如何设置域名的SPF记录[EB/OL].http://www.enonn.com/articles/spf-record.html.RBLCheck[EB/OL].http://www.rbl-check.com/.
  • 5RBL Check[ EB/OL]. http ://www. rbl-check, corn/.
  • 6四大国际反垃圾邮件组织介绍[EB/OL].http://www.chinaemail.corn.cn/zixun/corp/201005/49362.html.
  • 7CBL(中国垃圾邮件黑名单)[EB/OL].http://www.anti-spam.org.cn/AID/7.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部