期刊文献+

基于信任链的骚扰电话预判技术研究

Prediction Technology of Harassment Call based on Trust Chain
下载PDF
导出
摘要 当前,骚扰电话乱象屡禁不止,严重影响了人民群众的正常生活,甚至威胁到个人财产安全,因此简单有效地识别骚扰电话技术成为亟待解决的问题。区别于现有的对电话号码进行黑白名单标记、大数据分析等识别方法,提出基于信任链的骚扰电话预判技术,从可信度量的角度计算来电号码的可靠程度,并针对高危受害群体的典型应用场景进行分析,通过对骚扰电话的预判,降低其受到电话骚扰甚至电话诈骗的可能性。 At present,the harassment of telephone becomes a social issue,which seriously affects the normal life of the people,even threatens the safety of personal property.Therefore,it is an urgent problem to identify harassing telephone technology simply and effectively.Different from the existing identification methods such as black and white list marking and big data analysis for telephone numbers,proposes the technology of harassment call prediction based on trust chain,and calculates the reliability of the incoming phone numbers from the perspective of trust measurement,and analyzes the typical application scenarios of high-risk victim groups.By predicting the harassment of the phone,the possibility of people being harassed or even cheated by telephone is reduced.
作者 陈佳 杨少鹏 余双波 贾悠 CHEN Jia;YANG Shao-peng;YU Shuang-bo;JIA You(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
出处 《通信技术》 2020年第5期1277-1279,共3页 Communications Technology
关键词 骚扰电话 信任链 可信度量 传递模型 phone harassment trust chain trust measurement transfer model
  • 相关文献

参考文献3

二级参考文献52

  • 1梁昌勇,陈增明,黄永青,童建军.Dempster-Shafer合成法则悖论的一种消除方法[J].系统工程理论与实践,2005,25(3):7-12. 被引量:20
  • 2Jennifer Golbeck,James Hendler.Inferring Binary TrustRelationships in Web-based Social Networks[J].ACMTransactions on Internet Technology,2006,6(4):497-529.
  • 3Audun Jsang,Ross Hayward,Simon Pope.Trust Net-work Analysis with Subjective Logic[C].Proceedings ofthe 29th Australasian Computer Science Conference,Aus-tralia:Australian Computer Society,Inc.,2006:85-94.
  • 4Bruce Christianson,William Harbison.Why isnt TrustTransitive?[J].Security Protocols,1997(1189/1997):171-176.
  • 5Audun Jsang.The Right Type of Trust for DistributedSystems[C].Proceedings of the 1996 workshop on Newsecurity paradigms,ACM,1996,119-131.
  • 6Matt Blaze,Joan Feigenbaum,Jack Lacy.DecentralizedTrust Management[C].Security and Privacy,IEEE,1996,164-173.
  • 7Thomas Beth,Malte Borcherding,Birgit Klein.Valuationof Trust in Open Networks[C].Proceedings of the ThirdEuropean Symposium on Research in Computer Security,Springer,1994:3-18.
  • 8Karl Aberer,Zoran Despotovic.Managing trust in a peer-2-peer information system[C].Proceedings of the tenthinternational conference on Information and knowledge man-agement,ACM,New York.2001:310-317.
  • 9Audun Jsang An Algebra for Assessing Trust in Certifica-tion Chains[C].Proceedings of the Network and Distribu-ted Systems Security Symposium(NDSS’99).Citeseer,1999.
  • 10Gómez Mármol,F,G Martínez Pérez.Providing Trust inWireless Sensor Networks Using a Bio-inspired Tech-nique[J].Telecommunication Systems,2011,46(2):163.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部