期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
病毒曝光台
1
《中学生电脑》 2004年第9期14-14,共1页
关键词 木马病毒 五毒虫 Worm.Supnot.ai 网吧传奇杀手 电子邮件传播
下载PDF
How the Information and Communications Technology Threaten Our Privacy: The Case of Email and P2P Propagation Models 被引量:1
2
作者 Han-Wei Hsiao Cathy S. Lin Kun-Yu Chert 《Computer Technology and Application》 2011年第10期765-773,共9页
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat... With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy. 展开更多
关键词 Information privacy propagation model EMAIL peer-to-peer (P2P)
下载PDF
Research on E-mail Communication Network Evolution Model Based on User Information Propagation 被引量:1
3
作者 ZHANG Lejun GUO Lin XU Li 《China Communications》 SCIE CSCD 2015年第7期108-118,共11页
E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of ... E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of Enron dataset and the distribution of node degree and strength are analyzed. Then, some rules of e-mail communication network evolution are found. Second, the model of e-mail information propagation is described, and e-mail communication network evolution model based on user information propagation is proposed. Lastly, the simulation proves the correctness of the distribution characteristic of degree and strength of the model proposed and then verifies that the model proposed is closer to the real situation of e-mail communication network through parameter comparison. This research provides the basis for other researches on social network evolution and data communication. 展开更多
关键词 E-MAIL social network analysis network evolution information propagation
下载PDF
金山毒霸病毒预告
4
《大众软件》 2004年第1期25-25,共1页
关键词 金山毒霸 病毒预告 欢乐时光 电子邮件传播 蠕虫病毒 求职信病毒
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部