期刊文献+

Internet垃圾邮件过滤技术研究 被引量:4

Research of the Internet SPAM filters technique
下载PDF
导出
摘要 通过分析垃圾邮件的来源,提出了过滤垃圾邮件的方法,建立了相应的过滤规则,并通过实验证明了该规则的有效性。 This article analyzes the source of SPAM, putting forward the method of filtering SPAM, establishing the filtering rule, and proves the rules' validity by experiment.
机构地区 哈尔滨理工大学
出处 《信息技术》 2003年第12期80-81,85,共3页 Information Technology
关键词 垃圾邮件 过滤 中继 拒绝服务 SPAM FILTER RELAY DOS
  • 相关文献

参考文献3

二级参考文献4

共引文献11

同被引文献15

  • 1魏衍亮.垃圾邮件法律问题研究[J].金陵法律评论,2002(1):73-82. 被引量:2
  • 2周连兵.垃圾邮件探析[J].中国公共安全(学术版),2006(2):82-84. 被引量:2
  • 3Henxi Wang,John C Knight,Mattbew C Elder.On Computer Viral Infection and the Effect of Immunization[R].University of Virginia,2000.
  • 4R Sekar,M Bendre,P Bollineni,et al.A Fast Automaton-based Approach for Leaning Program Behaviors[C].IEEE Symposium on Security and Privacy,2001.
  • 5Carol Taylor,Jim Alves-Foss,et al.Network Analysis of Anomalous Traffic Events,A Low-cost Approach[C].New Security Paradigms Workshop,2001.
  • 6Matthew G Scbultz,Eleazar Eskin,Salvatore J Stolfo.Malicious Email Filter:An UNIX Mail Filter that Detects Malicious Windows Executables[C].Proceedings of USENIX Annual Technical Confe-rence,2001.
  • 7M G Schultz,E Eskin,E Zadok.Data Mining Methods for Detection of New Malicious Executables[C].IEEE Symposium on Security and Privacy,2001.
  • 8C C Zou,W Gong,Don Towsley.Code Red Worm Propagation Mode-ling and Analysis[C].ACM Computer and Communication Security Conference,2002.
  • 9R Sekar,A Gupta,J Frullo,et al.Specification-based Anomaly Detection:A New Approach for Detecting Network Intrusions[C].ACM Computer and Communication Security Conference,2002.
  • 10Manasi Bhattacharyya,Shlomo Hershkop,Eleazar Eskin,et al.MET:An Experimental System for Malicious Email Tracking[C].Workshop on New Security Paradigms,2002.

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部