期刊文献+

数据挖掘技术及其在电子邮件中的应用 被引量:2

Data-mining technique and its application in electronic mail
下载PDF
导出
摘要 介绍了数据挖掘技术及电子邮件的传输原理 ,分析了垃圾邮件的数据特征及邮件炸弹的传输特性 ,针对海量电子邮件数据 ,将数据挖掘技术应用于电子邮件的安全管理中 ,并给出了在电子邮件安全管理中应用数据挖掘技术的简要过程。 Data-Mining technique and the theory of transfer electronic mail are introduced in this paper. And the data characterization of junk mail and transfer feature of mail bomb are analyzed in detail. Employed the Data-Mining technique, the method of the security management of mail is presented for large quantities of electronic mail data. The compendious process of Data-Mining is described for the security management of electronic mail.
出处 《信息技术》 2003年第7期4-5,26,共3页 Information Technology
关键词 数据挖掘技术 电子邮件 邮件炸弹 文本数据 安全管理 data mining junk mail mail bomb text data
  • 相关文献

参考文献5

二级参考文献17

  • 1(美)DOUGLAS E 林瑶译.用TCP/IP进行网际互连(第三版)[M].北京:电子工业出版社,1998.324-333.
  • 2(美)James C 熊辉译.UNIX奥秘(第二版)[M].北京:电子工业出版社,1999.305-337.
  • 3(美)Robin Burk David B.Horvath 前导工作室译.UNIX技术大全-Internet卷[M].北京机械工业出版社,1999.240-252.
  • 4(美)W .Richard Stevens 施振川.UNIX网络编程[M].北京:清华大学出版社,1995.47-149,283-197.
  • 5[2]Friedman N.Bayesian Network Classifiers. Machine Learning, 1997,29:1 31~163
  • 6[3]Heckerman D.Learning Bayesian Networks:[Technical Report MSR-TR-95- 02].Microsoft Research, Microsoft Corporation,1995
  • 7[4]Sahami M, Dumais S, Heckerman D.A Baysian Approach to Filtering Junk E-Mail. AAAI 98 Workshop on Text Categorization, July 1998
  • 8[5]Schapire R, Singer E, Singhai Y. A Boosting and Rocchio Applied to T ext Filtering http://166.111.136.3/softengi/kddforum/filelist.php3?addr=dmpapers /textmining&page=2
  • 9[6]Mladenic D, Grobelink M. Feature selection for classification based on text hierarchy http://166.111.136.3/softengi/kddforum/filelist.php3?addr=dmpa pers/textmining&page=4
  • 10[1]Heckerman D.Bayesian networks from data mining[J]. Data Mining and Knowledge Discovery, 1997,1:79~119

共引文献21

同被引文献5

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部