期刊文献+

基于网络信息隐性挖掘技术的恐怖人员定位 被引量:2

The Method of Terrorists Location Based on Network Information Hidden Mining Technology
下载PDF
导出
摘要 恐怖人员在网络中发送恐怖信息时,根据恐怖信息来源的网络节点能够实现对恐怖人员的准确定位。恐怖人员发送恐怖信息与正常信息的属性不同,伪装性较强。利用传统的恐怖信息挖掘方法进行恐怖人员定位时,固有的恐怖信息被伪装,难以进行恐怖信息的准确挖掘,造成恐怖人员定位准确性降低。为此,提出一种基于聚类算法的网络中恐怖信息挖掘方法。在网络信息中筛选有价值的恐怖信息特征,从而为恐怖信息挖掘提供依据。利用聚类算法,对所有恐怖信息特征进行聚类处理,能够实现对网络中恐怖信息的挖掘,最终实现了对恐怖人员的定位。实验结果表明,利用该方法进行网络中恐怖信息挖掘,能够实现对恐怖人员的准确定位。 Terrorist people send terrorist information in the network, the network node based on terroristinformation sources to realize accurate positioning to the terrorist.Terrorist people send terroristinformation normal attribute is different, disguise the strong.Using traditional information miningmethods for horror personnel positioning, the terrorist information inherent in disguise, to terroristinformation mining accurately, which reduces the terrorist personnel positioning accuracy.For this, putforward a network based on clustering algorithm in the terrorist information mining method.Screening ofthe horrors of the valuable information in the network information characteristics, so as to provide thebasis for terrorist information mining.Using clustering algorithms, clustering characteristics of all terroristinformation processing, can realize the network of information mining of terror, finally realizes thelocalization to the terrorist.The experimental results show that the terrorist in the use of the method fornetwork information mining, can realize accurate positioning to the terrorist.
作者 林志伟
出处 《科技通报》 北大核心 2014年第9期143-146,共4页 Bulletin of Science and Technology
关键词 网络信息 数据挖掘 恐怖人员 定位 network information data mining terrorists locattion
  • 相关文献

参考文献8

二级参考文献56

共引文献253

同被引文献17

  • 1张振翎,李建华.网络欺诈及防范体系研究[J].信息安全与通信保密,2007,29(1):109-110. 被引量:4
  • 2Rubin S,Christodorescu M,Ganapathy V,et al.An auctioning reputation system based on anomaly[C]//Proceedings of the 12th ACM Conference on Computer and Communications Security.ACM,2005:270-279.
  • 3Hendrikx F,Bubendorfer K,Chard R.Reputation systems:A survey and taxonomy[J].Journal of Parallel and Distributed Computing,2015,75:184-197.
  • 4Mohanty B K,Passi K.Agent based e-commerce systems that react to buyers,feedbacks-A fuzzy approach[J].International Journal of approximate reasoning,2010,51(8):948-963.
  • 5Allen J.Case study:implementing MT for the translation of pre-sales marketing and post-sales software deployment documentation at Mycom International[M],Machine Translation:From Real Users to Research.Springer Berlin Heidelberg,2004:1-6.
  • 6Sun S,Wang 丁,Chen L,et al.Understanding Consumers,trust in Internet Financial Sales Platform:Evidence from a YueBaoM[C]// Proceeding of Pacific Asia Conference on Information System(PACIS).2014.
  • 7Li W,Chen H.Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis[C]//2014 IEEE Joint Intelligence and Security Informatics Conference(JISIC).IEEE,2014:64-67.
  • 8Liberatore M,Levine B N,Shields C.Strengthening forensic investigations of child pornography on p2p networks[C].Proceedings of the 6th International Conference.ACM,2010:19.
  • 9Haggerty J,Llewellyn-Jones D,Taylor M.Forweb:file fingerprinting for automated network forensics investigations Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications,Information,and Multimedia and Workshop.ICST(Institute for Com-puter Sciences,Social-Informatics and Telecommunications Engineering),2008:29.
  • 10Nair A S V,Ajeena B A S.A Log Based Strategy for Fingerprinting and Forensic Investigation of Online Cyber Crimes[Cj// Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing.ACM,2014:7.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部