期刊文献+

意会关键词信息取证方法 被引量:3

Information Forensics Method for Tacit Keyword
下载PDF
导出
摘要 新型宣传媒介的网络舆情存在大量非法信息。为此,提出一种意会关键词信息取证方法,对中文意会关键词进行定义、分类和量化,给出6种意会关键词提取算法,对提取的证据信息进行完整性处理。实验结果表明,6种算法的提取速度均在毫秒级,查准率和查全率分别达到92%和95%,从而保证在网页舆情监控下非法信息的取证效率。 As a new form of media,the Internet public opinion influences the society profoundly.Information forensics is an important aspect in the Internet public opinion monitoring field.To resolve the problem of unhealthy information forensics,an information forensics technique for tacit keywords is presented.It defines the term of tacit keywords,then classifies and quantifies tacit keywords.Six algorithms of tacit keywords extracted for information forensics are proposed.Based on the algorithms,the integrity of the evidence information is protected with Hash function.Experimental results show all the extraction time of the six algorithms presented controls in the ms grade,and the accurate rate and recall rate are up to 92% and 95%.This indicates that the presented information forensics technique is effective.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第19期266-269,共4页 Computer Engineering
基金 海军工程大学科学研究基金资助项目(HGDYDJJ10008)
关键词 信息取证 意会关键词 言传关键词 中文主动干扰 information forensics tacit keyword explicit keyword active jamming in Chinese
  • 相关文献

参考文献10

二级参考文献28

  • 1苏贵洋,李建华,马颖华,李生红.用于中文色情文本过滤的近邻法构造算法[J].上海交通大学学报,2004,38(z1):76-79. 被引量:6
  • 2李强,李建华.基于向量空间模型的过滤不良文本方法[J].计算机工程,2006,32(10):4-5. 被引量:14
  • 3Salton G,Lesk M E.Computer Evaluation of Indexing and Text Processing[J].Journal of the ACM,1968,15(1):8-36.
  • 4Salton G,Buckley C.Term-weighting Approaches in Automatic Text Retrieval[R].Ithaca,USA:Cornell University.Tech.Rep.:TR87-881,1987.
  • 5M.Dacier, Design of an Intrusion-Tolerant Intrusion Detection System, Maliciou-and Accidental-Fault tolerance for Internet Applications[J].Aug.9, 2002.
  • 6Fengmin Gong, Deciphering Detection Techniques: PartII Anomaly-Based Intrusion Detection, Network Associates White Paper[J].March 2003.
  • 7Sandeep Kumar. Glassicaion and Detection of Computer Intrusions. PhD thesis, Purdue University. West Lafayette, IN 47907, 1996[J/OL].ftp://coast.cs.purclue.ect~mWCOAST/papers/ 5SndeeP-lWm&/kumar-intdet-phddiss.pgz.
  • 8Wenke Lee, Salvatore J. Stolfo, A Framework for Construction Features and Models for Intrusion Detection Systems[J].ACM Transactions on Information and System Security,Vol 3 , Nov.2000,pp:227-261.
  • 9Palmer G. A road map for digital forensics research[R]. Report From the First Digital Forensics Research Workshop(DFRWS), 2001
  • 10ScbneierB著 吴世忠 祝世雄 张文政译.应用密码学协议、算法与C源程序[M].北京:机械工业出版社,1996..

共引文献26

同被引文献22

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部