期刊文献+

基于隐性知识挖掘的网络犯罪案件数据分析技术研究 被引量:4

The Data Analysis Study of Network Crimes based on Tacit Knowledge Mining
下载PDF
导出
摘要 随着网络犯罪的日益猖獗,网络侦查取证工作对海量数据进行获取、分析的技术遇到空前挑战,如何从海量数据中提取与犯罪事实相关的数据作为电子证据是当前急需关注的问题。文章旨在研究与网络犯罪案件相关的"隐性知识"显性化的方法,提出本领域基于隐性知识的数据挖掘智能分析过程,为打击网络犯罪的侦查取证工作提供新的技术思路与方法。 As the network crime is rampant ,the investigation work on network forensics faces unprecedented challenges when it obtain and analyze vast amounts of data .How to pick up data which related to criminal facts from huge amounts of data is an urgent need. The purpose of this paper is to put tacit knowledge which related to network crimes to explicit knowledge, and to put forward the analysis process of mining data based on tacit knowledge, providing a new technical idea and method for the work of cybercrime investigation.
出处 《信息网络安全》 2013年第10期200-202,共3页 Netinfo Security
关键词 隐性知识 网络犯罪 刑事侦查 数据分析 tacit knowledge network crime criminal investigation data analysis
  • 相关文献

参考文献6

二级参考文献15

  • 1张有东,王建东,叶飞跃,陈惠萍,李涛.网络取证及其应用技术研究[J].小型微型计算机系统,2006,27(3):558-562. 被引量:10
  • 2国家互联网应急中心.CNCERT互联网安全威胁报告[R].北京,2012. 被引量:2
  • 3中国互联网络信息中心.中国互联网络发展状况统计报告[R].北京,2012. 被引量:15
  • 4Jin-lin Chen, Bao-yaoZhou, Jin Shi, Hong-Jiang Zhang, Feng- wuQiu.Function-based Object Model towards Website Adaptation[C].In: Proceedings of the 10th International Conference on World Wide Web. 2001, 587-596. 被引量:1
  • 5Deng Cai, Shi-peng Yu, Ji-rongWen andWei-ying Ma. VIPS:AVision-based PageSegmentation Algorithm[R], Microsoft TechnicalReport, 2003. 被引量:1
  • 6Shian-hua Lin, Jan-ming Ho. Discovering Informative Content Blocks from Web Documents [C].ln: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Washington DC: ACM Press, 2002. 被引量:1
  • 7Christopher J. C. Burges. A Tutorial on Support Vector Machines for Pattern Recognition [J]. Data Mining and Knowledge Discovery, 1998: 121-167. 被引量:1
  • 8Miguel E. Ruiz, PadminiSrinivasan. Hierarchical Text Categorizafon Using Neural Networks[J]. Kluwer Academic Publishers Hingham, 20f12: 87-118. 被引量:1
  • 9Marcus Ranum. Intrusion Detection: Challenges and Myths, Network flight recorder [EB/OL]. http://www.sans.org/reading_room/ whitepapers/detection/intrusion- detection-systems- definition- challenges_343, 1998. 被引量:1
  • 10RFC 2460, Intemet Protocol, Version 6 (IPv6) Specification[EB/OL]. http://tools.ietf.org/pdf/rfc2460.pdf, 1998. 被引量:1

共引文献28

同被引文献40

引证文献4

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部