4Figg W, Zhou Z H. A computer forensics minor curriculum proposal [J]. Journal of Computing Sciences in Colleges, 2007, 22(4) :32 -38.
5Yasinac A, Manzano Y. Policies to Enhance Computer and Network Forensics [ C ]//IEEE Systems, Man, and Cybernetics Information Assurance Workshop, USA: IEEE, 2001 : 289 - 295.
6Huebner E, Henskens F. The role of operating systems in computer forensics [ J]. ACM SIGOPS Operating Systems Review, 2008, 42 (3) : 1 - 3.
7Chen J Y, Palmer P. Chinese Verb Sense Discrimination Using an Em clustering Model with Rich Linguistic Features [ C] //Annual Meeting of the ACL archive: Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics. Morristown, N J, USA: Association for Computational Linguistics, 2004 : 295 - 302.
8Zhang H, Jiang L X, Su Jiang. Augmenting Naive Bayes for Ranking [ C ] //Proceedings of the 22nd international conference on Machine learning. Bonn, Germany: ACM Press, 2005 : 1020 - 1027.
9Jin X, Xu A B, Bie R F, et al. Spam Email Filtering with Bayesian Belief Network: Using Relevant Words [ C ]//2006 IEEE International Conference on Granular Computing, Atlanta, USA: IEEE, 2006:238-243.
10Liu M, LiY C, LiW. Spare Filtering by Stages [C]// Proceedings of the 2007 International Conference on Con- vergence Information Technology. Washington DC, USA: IEEE Computer Society, 2007:2209 - 2213.