首页 > 最新文献

2009 Fifth International Conference on Information Assurance and Security最新文献

英文 中文
Research on Active Defence Technology with Host Intrusion Based on K-Nearest Neighbor Algorithm of Kernel 基于核k近邻算法的主机入侵主动防御技术研究
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.255
Xuedou Yu
In this paper, the intrusion detection system is introduced, and point out two important prerequisite that the IDS work normally must depend on, and in view of the prerequisite, the paper proposed a solution which is based on k-nearest neighbor algorithm of kernel and the active defence technology anti-host intrusion. The solution can distinguish normal event from the unknown event efficiently, and can detect unknown event more accurately.
本文对入侵检测系统进行了介绍,指出了入侵检测系统正常工作必须依赖的两个重要前提,并针对这两个前提,提出了一种基于核k近邻算法和主动防御技术的防主机入侵解决方案。该方法能有效区分正常事件和未知事件,并能更准确地检测出未知事件。
{"title":"Research on Active Defence Technology with Host Intrusion Based on K-Nearest Neighbor Algorithm of Kernel","authors":"Xuedou Yu","doi":"10.1109/IAS.2009.255","DOIUrl":"https://doi.org/10.1109/IAS.2009.255","url":null,"abstract":"In this paper, the intrusion detection system is introduced, and point out two important prerequisite that the IDS work normally must depend on, and in view of the prerequisite, the paper proposed a solution which is based on k-nearest neighbor algorithm of kernel and the active defence technology anti-host intrusion. The solution can distinguish normal event from the unknown event efficiently, and can detect unknown event more accurately.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115884560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on Algorithm of Digital Filtering Based on Video Information Security 基于视频信息安全的数字滤波算法研究
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.307
Jin Tian, Y. Qiu, Liuyu Qian
In this paper, on the basis of the spot pulse width corresponded with character video information vertical stroke, the safe bandwidth of video information is confirmed, filtering image quality appraisal model which takes difference threshold limit value as distinction parameter is built by Weber – Fechner law, the corresponding relation of filtering stop-band cut-off frequency and character is determined, the FIR digital filter is designed. In addition, aim at the periodic variation characteristic of the insertion loss which the digital filter inherent, a combinatorial filtering method combine digital filter and analog filter is presented. At last, the correctness and effectiveness of theoretical analysis are validated through simulations and experiments.
本文根据字符视频信息垂直行程对应的光斑脉冲宽度,确定了视频信息的安全带宽,利用Weber - Fechner定律建立了以差分阈值限值为区分参数的滤波图像质量评价模型,确定了滤波阻带截止频率与字符的对应关系,设计了FIR数字滤波器。此外,针对数字滤波器固有的插入损耗周期性变化的特点,提出了一种结合数字滤波器和模拟滤波器的组合滤波方法。最后,通过仿真和实验验证了理论分析的正确性和有效性。
{"title":"Research on Algorithm of Digital Filtering Based on Video Information Security","authors":"Jin Tian, Y. Qiu, Liuyu Qian","doi":"10.1109/IAS.2009.307","DOIUrl":"https://doi.org/10.1109/IAS.2009.307","url":null,"abstract":"In this paper, on the basis of the spot pulse width corresponded with character video information vertical stroke, the safe bandwidth of video information is confirmed, filtering image quality appraisal model which takes difference threshold limit value as distinction parameter is built by Weber – Fechner law, the corresponding relation of filtering stop-band cut-off frequency and character is determined, the FIR digital filter is designed. In addition, aim at the periodic variation characteristic of the insertion loss which the digital filter inherent, a combinatorial filtering method combine digital filter and analog filter is presented. At last, the correctness and effectiveness of theoretical analysis are validated through simulations and experiments.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114902204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Accelerated RC4 Scheme Using “Ultra Gridsec” and “HIMAN” and use this Scheme to Secure “HIMAN” Data 一种新的基于“超网格”和“HIMAN”的加速RC4方案,并使用该方案保护“HIMAN”数据
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.140
H. Kholidy, K. Alghathbar
in most applications, security attributes are pretty difficult to meet but security becomes even a bigger challenge when talking about Grid Computing. Providing secure communication between elements of a computational Grid, by encrypting data passes between them using enhanced encryption algorithms that do not affect the Performance of the grid middleware completely comparable to the actual execution time.In this paper we will cover two points. First, accelerating RC4 encryption algorithm using our developed Grid Security Scheme "ULTRA GRIDSEC" and our developed "HIMAN" middleware and show that RC4 was accelerated by about 873.52% comparable to that accelerated by "GRIDCRYPT" Scheme that applied by "Alchemi" middleware developed by Melbourne University. Second, using the accelerated RC4 scheme to secure communication between elements of "HIMAN", the stream ciphering algorithms like RC4 are the most suitable encryption algorithms for applying inside "HIMAN" as we will show.
在大多数应用程序中,安全属性很难满足,但是在讨论网格计算时,安全性就变成了一个更大的挑战。通过使用增强的加密算法加密它们之间的数据传递,提供计算网格元素之间的安全通信,这些加密算法不会影响网格中间件的性能,完全与实际执行时间相当。在本文中,我们将讨论两点。首先,利用我们开发的网格安全方案“ULTRA GRIDSEC”和我们开发的“HIMAN”中间件对RC4加密算法进行了加速,结果表明,与墨尔本大学开发的“Alchemi”中间件应用的“GRIDCRYPT”方案相比,RC4的加速速度约为873.52%。其次,使用加速的RC4方案来保护“HIMAN”元素之间的通信,像RC4这样的流加密算法是最适合在“HIMAN”内部应用的加密算法,我们将展示。
{"title":"A New Accelerated RC4 Scheme Using “Ultra Gridsec” and “HIMAN” and use this Scheme to Secure “HIMAN” Data","authors":"H. Kholidy, K. Alghathbar","doi":"10.1109/IAS.2009.140","DOIUrl":"https://doi.org/10.1109/IAS.2009.140","url":null,"abstract":"in most applications, security attributes are pretty difficult to meet but security becomes even a bigger challenge when talking about Grid Computing. Providing secure communication between elements of a computational Grid, by encrypting data passes between them using enhanced encryption algorithms that do not affect the Performance of the grid middleware completely comparable to the actual execution time.In this paper we will cover two points. First, accelerating RC4 encryption algorithm using our developed Grid Security Scheme \"ULTRA GRIDSEC\" and our developed \"HIMAN\" middleware and show that RC4 was accelerated by about 873.52% comparable to that accelerated by \"GRIDCRYPT\" Scheme that applied by \"Alchemi\" middleware developed by Melbourne University. Second, using the accelerated RC4 scheme to secure communication between elements of \"HIMAN\", the stream ciphering algorithms like RC4 are the most suitable encryption algorithms for applying inside \"HIMAN\" as we will show.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115371243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Digital Certificate Application Scheme in Content Protection System for High Definition Digital Interface 高清数字接口内容保护系统中的数字证书申请方案
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.31
Kefeng Fan, Subing Zhang, W. Mo
A digital certificate scheme in content protection system for high definition digital interfaces is proposed. Before transferring the encryption content, the device interface is firstly confirmed whether it is passed the certification. After the certification, then transfers the content. The interface of the receiver detects whether the recognition management unit has passed the certification. The digital content is ensured by the recognition management unit, which can prevent the invalid capturing the information. In the period of certification, the characteristics of the certificate are fully made use of. The application shows the system is high secure, which can be used in the high definition digital interface.
提出了一种用于高清数字接口内容保护系统的数字证书方案。在传输加密内容之前,首先确认设备接口是否通过认证。认证后,再传输内容。接收端接口检测识别管理单元是否通过认证。数字内容由识别管理单元保证,可以防止非法捕获信息。在认证期间,充分利用证书的特性。应用表明,该系统具有较高的安全性,可用于高清数字接口。
{"title":"A Digital Certificate Application Scheme in Content Protection System for High Definition Digital Interface","authors":"Kefeng Fan, Subing Zhang, W. Mo","doi":"10.1109/IAS.2009.31","DOIUrl":"https://doi.org/10.1109/IAS.2009.31","url":null,"abstract":"A digital certificate scheme in content protection system for high definition digital interfaces is proposed. Before transferring the encryption content, the device interface is firstly confirmed whether it is passed the certification. After the certification, then transfers the content. The interface of the receiver detects whether the recognition management unit has passed the certification. The digital content is ensured by the recognition management unit, which can prevent the invalid capturing the information. In the period of certification, the characteristics of the certificate are fully made use of. The application shows the system is high secure, which can be used in the high definition digital interface.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115682949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Approach for Audio Watermarking 一种新的音频水印方法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.22
M. Zamani, A. Manaf, R. Ahmad, A. Zeki, Pritheega Magalingam
This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
本文提出了一种新颖的、有原则的方法来解决音频水印替代技术存在的问题。利用该遗传算法,消息位被嵌入到多个模糊和更高的LSB层中,从而提高了鲁棒性。特别是对于那些试图揭示隐藏信息的故意攻击和一些无意的攻击(如噪声添加),鲁棒性会得到提高。
{"title":"A Novel Approach for Audio Watermarking","authors":"M. Zamani, A. Manaf, R. Ahmad, A. Zeki, Pritheega Magalingam","doi":"10.1109/IAS.2009.22","DOIUrl":"https://doi.org/10.1109/IAS.2009.22","url":null,"abstract":"This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123926370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Efficient Protection Scheme for SVC Content Based on Network Coding 基于网络编码的SVC内容有效保护方案
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.37
Ji Lu, Song Xiao, Chengke Wu
How to protect the video streaming for reasonable usage is a necessary technology in multimedia services over network. However, most the previous schemes are too complicated and time-consuming to apply in real multimedia content protection system. Network Coding (NC) is a new technology which codes the input information at intermediate nodes and can make the network information flow achieve the upper bound of max-flow min-cut theory. Random Linear Network Coding (RLNC) is a practical approach of NC with advantage of decentralized operation. In this paper, we proposed a novel scalable video streaming protection algorithm with an efficient packetization scheme and a distribution scheme according to authority levels of different users based on RLNC approach. The algorithm classified the packetized packets into different levels and employed three kinds of permission matrix (PM) to control the distribution of video streaming. The implementation of the proposed algorithm was described in detail to show the efficiency and low complexity of the method.
如何保护视频流,使其合理使用,是网络多媒体业务中的一项必要技术。然而,以往的方案大多过于复杂和耗时,无法应用于实际的多媒体内容保护系统。网络编码是将输入信息在中间节点进行编码,使网络信息流达到最大流最小割理论的上界的一种新技术。随机线性网络编码(RLNC)是一种实用的数控编码方法,具有分散操作的优点。本文提出了一种基于RLNC方法的可扩展视频流保护算法,该算法具有高效的分组方案和根据不同用户权限级别的分发方案。该算法将分组后的数据包划分为不同的级别,并采用三种权限矩阵(PM)控制视频流的分发。文中详细描述了该算法的实现,证明了该算法的高效性和低复杂度。
{"title":"Efficient Protection Scheme for SVC Content Based on Network Coding","authors":"Ji Lu, Song Xiao, Chengke Wu","doi":"10.1109/IAS.2009.37","DOIUrl":"https://doi.org/10.1109/IAS.2009.37","url":null,"abstract":"How to protect the video streaming for reasonable usage is a necessary technology in multimedia services over network. However, most the previous schemes are too complicated and time-consuming to apply in real multimedia content protection system. Network Coding (NC) is a new technology which codes the input information at intermediate nodes and can make the network information flow achieve the upper bound of max-flow min-cut theory. Random Linear Network Coding (RLNC) is a practical approach of NC with advantage of decentralized operation. In this paper, we proposed a novel scalable video streaming protection algorithm with an efficient packetization scheme and a distribution scheme according to authority levels of different users based on RLNC approach. The algorithm classified the packetized packets into different levels and employed three kinds of permission matrix (PM) to control the distribution of video streaming. The implementation of the proposed algorithm was described in detail to show the efficiency and low complexity of the method.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124085729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Moment Based Registration Scheme Utilizing Support Vector Machine 基于支持向量机的图像矩配准方案
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.175
Jianzhen Wu
A novel image registration scheme is proposed in this paper. Six low order image moments are used as image global pattern features and are feed into support vector machine to estimate translation, rotation and scaling parameters. Simulation results show that the proposed registration scheme is accurate and robust to noise.
提出了一种新的图像配准方案。将6个低阶图像矩作为图像全局模式特征,输入支持向量机估计平移、旋转和缩放参数。仿真结果表明,该配准方案具有较好的精度和抗噪性。
{"title":"Image Moment Based Registration Scheme Utilizing Support Vector Machine","authors":"Jianzhen Wu","doi":"10.1109/IAS.2009.175","DOIUrl":"https://doi.org/10.1109/IAS.2009.175","url":null,"abstract":"A novel image registration scheme is proposed in this paper. Six low order image moments are used as image global pattern features and are feed into support vector machine to estimate translation, rotation and scaling parameters. Simulation results show that the proposed registration scheme is accurate and robust to noise.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"54 50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122004369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emergency Command System for Geologic Disasters Prevention 地质灾害防治应急指挥系统
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.51
Wenbiao Peng, Chaojun Yan, Xinqiong Liu, Lihua Deng
The emergency command system is an important part in the project of warning, monitoring and geologic disasters prevention in the Three Gorges Reservoir Area, because it can provide a reliable technical guarantee. This paper describes a multimedia emergency command system based on satellite IP link. The characteristics include an on-the-spot information collection and transmission, an integrated emergency communications, an emergency commanding, an emergency dispatching and strategic decision analysis. The system can meet the need of emergency mobile command and is effective and practical. It enhances the efficiency of working for establishing interconnection of the discrete resources and realizing the commanding of emergency.
应急指挥系统是三峡库区预警监测和地质灾害防治工程的重要组成部分,能够提供可靠的技术保障。介绍了一种基于卫星IP链路的多媒体应急指挥系统。其特点包括现场信息采集与传输、应急综合通信、应急指挥、应急调度和战略决策分析。该系统能够满足应急机动指挥的需要,具有一定的实用性和有效性。提高了离散资源互联互通的工作效率,实现了应急指挥。
{"title":"Emergency Command System for Geologic Disasters Prevention","authors":"Wenbiao Peng, Chaojun Yan, Xinqiong Liu, Lihua Deng","doi":"10.1109/IAS.2009.51","DOIUrl":"https://doi.org/10.1109/IAS.2009.51","url":null,"abstract":"The emergency command system is an important part in the project of warning, monitoring and geologic disasters prevention in the Three Gorges Reservoir Area, because it can provide a reliable technical guarantee. This paper describes a multimedia emergency command system based on satellite IP link. The characteristics include an on-the-spot information collection and transmission, an integrated emergency communications, an emergency commanding, an emergency dispatching and strategic decision analysis. The system can meet the need of emergency mobile command and is effective and practical. It enhances the efficiency of working for establishing interconnection of the discrete resources and realizing the commanding of emergency.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124576083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research on Improved Algorithm for Chinese Word Segmentation Based on Markov Chain 基于马尔可夫链的中文分词改进算法研究
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.317
Pang Baomao, Shi Haoshan
Chinese words segmentation is an important technique for Chinese web data mining. After the research made on some Chinese word segmentation nowadays, an improved algorithm is proposed in this paper. The algorithm updates dictionary by using Two-way Markov Chain, and does word segmentation by applying an improved Forward Maximum Matching Method based on word frequency statistic. The simulation shows this algorithm can finish word segmentation for a given text quickly and accurately.
中文分词是中文网页数据挖掘的一项重要技术。本文通过对目前一些中文分词算法的研究,提出了一种改进的分词算法。该算法采用双向马尔可夫链更新词典,采用改进的基于词频统计的前向最大匹配方法进行分词。仿真结果表明,该算法可以快速准确地完成给定文本的分词。
{"title":"Research on Improved Algorithm for Chinese Word Segmentation Based on Markov Chain","authors":"Pang Baomao, Shi Haoshan","doi":"10.1109/IAS.2009.317","DOIUrl":"https://doi.org/10.1109/IAS.2009.317","url":null,"abstract":"Chinese words segmentation is an important technique for Chinese web data mining. After the research made on some Chinese word segmentation nowadays, an improved algorithm is proposed in this paper. The algorithm updates dictionary by using Two-way Markov Chain, and does word segmentation by applying an improved Forward Maximum Matching Method based on word frequency statistic. The simulation shows this algorithm can finish word segmentation for a given text quickly and accurately.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123507754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Research on the Measurement of China Internet Illegal and Harmful Content 中国网络违法有害内容计量研究
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.230
Qiang Song, Gang Li
Although the Internet allows people to release, convey and obtain information freely and conveniently, the excessive spread of illegal and harmful information negatively affects the Internet development and obstructs Internet culture from thriving. On the basis of analyzing the root cause of illegal and harmful content on the Internet, this article helps to establish an index system for measuring them. At the same time, it suggests methods to collect data on measurement indicators.
虽然互联网使人们能够自由、便捷地发布、传递和获取信息,但非法、有害信息的过度传播影响了互联网的发展,阻碍了网络文化的蓬勃发展。本文在分析网络非法有害内容产生的根本原因的基础上,建立了衡量网络非法有害内容的指标体系。同时提出了测量指标的数据采集方法。
{"title":"The Research on the Measurement of China Internet Illegal and Harmful Content","authors":"Qiang Song, Gang Li","doi":"10.1109/IAS.2009.230","DOIUrl":"https://doi.org/10.1109/IAS.2009.230","url":null,"abstract":"Although the Internet allows people to release, convey and obtain information freely and conveniently, the excessive spread of illegal and harmful information negatively affects the Internet development and obstructs Internet culture from thriving. On the basis of analyzing the root cause of illegal and harmful content on the Internet, this article helps to establish an index system for measuring them. At the same time, it suggests methods to collect data on measurement indicators.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123928396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 Fifth International Conference on Information Assurance and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1