期刊文献+

IPTV监管平台建设方案 被引量:4

Construction Scheme of IPTV Monitoring Platform
下载PDF
导出
摘要 三网融合总体方案公布以后,IPTV集控平台和监管平台的建设,手机电视集控平台和监管平台的建设就成为当前广电工作的重点。本文详细介绍IPTV监管平台的建设思路,并对监管平台中的模块建设进行分析。 IPTV monitoring platform in Wuhan, Hubei is introduced in this paper. As a part of China’s IPTV monitoring platform, this platform uses a method, based content recognition of IPTV’s EPG menu and video program, to check EPG menu and video content by collecting test equipment deployed at program source and distributing node front-end. In this way, the platform can monitor IPTV content, and protects security of network information.
出处 《广播与电视技术》 2012年第2期129-132,15,共4页 Radio & TV Broadcast Engineering
  • 相关文献

参考文献1

二级参考文献13

  • 1AHO A V, CORASICK M J. Efficient string matching: an aid to bibliographic search [J]. Communications of the ACM,1975,18(6): 330-340.
  • 2KUMAR S, TURNER J, WILLIAMS J. Advanced algorithms for fast and scalable deep packet inspection [C]ffProceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems(ANCS' 06), Dec 3-5,2006,San Jose, CA, USA. New York, NY USA:ACM. 2006:81-92.
  • 3NAGHMOUCHI J, SCARPAZZA D P, BEREKOVIC M. Small-ruleset regular expression matching on GPGPUs: Quantitative performance analysis and optimization [C]//Proceedings of the 24th ACM International Conference on Supercomputing(ICS' 10), Jun 2-4,2010, Tsukuba, Ibaraki, Japan. New York, NY, USA: ACM. 2010: 337-348.
  • 4LIN Y R, HUANG H Y, HSU W H. An embedded watermark technique in video for copyright protection [C]//Proceedings of theIEEE 18th International Conference on Pattern Recognition (ICPR '06): Vol 4, Aug 20-24, 2006, Hong Kong, China. Piscataway, NJ,USA: IEEE, 2006:795-798.
  • 5SUN Q, HE D, TIAN Q. A secure and robust authentication scheme for video transcoding [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006,16(10): 1232-1244.
  • 6WANG W H, FAFID H. Exposing digital forgeries in video by detecting double MPEG compression IC]//Proceedings of the ACM Muhimedia and Security Workshop(MM&Sec'06), Sep 26-27,2006, Geneva, Switzerland. New York, NY,USA: ACM. 2006:37-47.
  • 7STONE R, Centertrack: An IP overlay network for tracking DoS floods [C]// Proceedings of the 9th Conference on USENIX Security Symposium, Aug 14-17, 2000,Denver,CO, USA. Berkeley, CA, USA USEN IX Association. 2000:199-212.
  • 8BURCH H, CHESWICK B. Tracing anonymous packets to their approximate source [C]// Proceedings of the 14th USENIX Conference on System Administration(LISA' 00), Dec 3-8,2000, New Orleans, LA, USA. Berkeley, CA, USA USENIX Association. 2000:319-327.
  • 9SONG D X, PERRIG A. Advanced and authenticated marking schemes for IP traceback [C]//Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM ' 01):Vol 2,Apr 22- 26,2001, Anchorage, AK,USA. Piscataway, NJ,USA IEEE. 2001:878-886.
  • 10WON Y J, PARK B C, JU H T, et al. A hybrid approach for accurate application traffic identificatJon [C]//Proceedings of the 4th IEEE/ IFIP Workshop on End-to-End Monitoring Techniques and Services(E2EMON'06), Apr 03,2006,Vancouver, Canada. Piscataway, N J, USA: IEEE, 2006:8p.

共引文献2

同被引文献20

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部