Computer Science ›› 2018, Vol. 45 ›› Issue (11): 138-142.doi: 10.11896/j.issn.1002-137X.2018.11.020
• Information Security • Previous Articles Next Articles
YANG Chao1, QIN Ting-dong1, FAN Bo2, LI Tao3
CLC Number:
[1]Beijing Internet Information Office.China Weibo Development Report .Beijing:People’s Publishing House,2014:59-106.(in Chinese) 北京互联网信息办公室.中国微博发展报告[M].北京:人民出版社,2014:59-106. [2]CNNIC.The 40th “China Internet Development Statistics Report” .http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201708/t20170803_69444.htm.(in Chinese) 中国互联网络信息中心.第40次《中国互联网络发展状况统计报告》.http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201708/t20170803_69444.htm. [3]SRIRAM B,FUHRY D,DEMIR E,et al.Short text classification in twitter to improve information filtering[C]∥Internatio-nal ACM SIGIR Conference on Research and Development in Information Retrieval.ACM,2010:841-842. [4]ZHAO Y Y,QIN B,LIU T.Sentiment Analysis[J].Journal of Software,2010,21(8):1834-1848.(in Chinese) 赵妍妍,秦兵,刘挺.文本情感分析[J].软件学报,2010,21(8):1834-1848. [5]LIU B.Sentiment analysis and subjectivity.https://www. researchgate.net/publication/228667268_Sentiment_analysis_and_subjectivity. [6]JIN L R.Structure and Content-based SpammerDection in Social Networks[D].Nanjing:Nanjing University of Posts,2016.(in Chinese) 金礼仁.基于结构与内容的社交网络水军团体识别[D].南京:南京邮电大学,2016. [7]MO Q,YANG K.Overview of Web Spammer Detection[J].Journal of Software,2014,25(7):1505-1526.(in Chinese) 莫倩,杨珂.网络水军识别研究[J].软件学报,2014,25(7):1505-1526. [8]RAMACHANDRAN A,FEAMSTER N.Understanding the network-level behavior of spammers[C]∥ACM.2006:291-302. [9]BHAT V H,MALKANI V R,SHENOY P D,et al.Classification of email using BeaKS:Behavior and keyword stemming.https://ieeexplore.ieee.org/document/6129290. [10]BRENDEL R,KRAWCZYK H.Application of social relation graphs for early detection of transient spammers[M].World Scientific and Engineering Academy and Society (WSEAS),2008:267-276. [11]ZHANG Y M,HUANG Y Y,GAN S J,et al.Weibo spammers’ identification algorithm based on Bayesian model[J].Journal on Communications,2017,38(1):44-53.(in Chinese) 张艳梅,黄莹莹,甘世杰,等.基于贝叶斯模型的微博网络水军识别算法研究[J].通信学报,2017,38(1):44-53. [12]LING Z,BAI Z Y,LUO S S,et al.Integrated intrusion detection model based on rough set and artificial immune[J].Journal on Communications,2013,34(9):166-176.(in Chinese) 张玲,白中英,罗守山,等.基于粗糙集和人工免疫的集成入侵检测模型[J].通信学报,2013,34(9):166-176. [13]YANG C,LI Z Y.Spam mass sending examination based on dendritic cell algorithm[J].Transducer & Microsystem Technologies,2015,34(10):133-136.(in Chinese) 杨超,李子怡.基于树突状细胞算法的垃圾邮件群发检测[J].传感器与微系统,2015,34(10):133-136. [14]WANG X X,LIANG Y W,et al.Application of dendritic cell algorithm on Web server anomaly detection[J].Computer Engineering & Applications,2016,52(24):148-152.(in Chinese) 王新新,梁意文.树突状细胞算法在Web服务器异常检测中的应用[J].计算机工程与应用,2016,52(24):148-152. [15]MATZINGER P.Tolerance,Danger and the Extended Family[J].Annual Review of Immunology,1994,12(1):991-1045. [16]AICKELIN U,BENTLEY P,CAYZER S,et al.Danger Theory:The Link between AIS and IDS?[C]∥Artificial Immune Systems,Second International Conference(ICARIS 2003).Edinburgh,UK,Proceedings.DBLP,2003:147-155. [17]AICKELIN U,GREENSMITH J,TWYCROSS J.Immune System Approaches to Intrusion Detection-A Review[C]∥International Conference on Artificial Immune Systems.Springer Berlin Heidelberg,2004:316-329. [18]GREENSMITH J,AICKELIN U,CAYZER S.Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection[M]∥Artificial Immune Systems.Springer Berlin Heidelberg,2005:153-167. [19]WANG Y Q,LIANG Y W,LIU S.Application-layer DDoS attack detection based on dendritic cell algorithm[J].Computer Engineering and Design,2015,36(4):841-845.(in Chinese) 王亚芹,梁意文,刘赛.基于树突状细胞算法的应用层DDoS攻击检测[J].计算机工程与设计,2015,36(4):841-845. [20]GREENSMITH J,AICKELIN U.The Dendritic Cell Algorithm[J].RevistaClínica Espaola,2007,202(10):552-554. [21]YI L L.Research on Statistical Characteristic Analysis and Modeling for User Behavior in Micro-blog Community Based on Human Dynamics[D].Beijing:Beijing University of Posts and Telecommunications,2012.(in Chinese) 易兰丽.基于人类动力学的微博用户行为统计特征分析与建模研究[D].北京:北京邮电大学,2012. [22]HE L,HE Y,HUO Y Q.Micro-blog user characteristics analysis and core user mining [J].Intelligence Theory and Practice,2011,34(11):121-125.(in Chinese) 何黎,何跃,霍叶青.微博用户特征分析和核心用户挖掘[J].情报理论与实践,2011,34(11):121-125. [23]WANG X G.Empirical Analysison Behavior Characteristics and Relation Characteristics of Micro-blog Users-Take “SinaMicro-blog” for Example[J].Library and Information Service,2010,54(14):66-70.(in Chinese) 王晓光.微博客用户行为特征与关系特征实证分析——以“新浪微博”为例[J].图书情报工作,2010,54(14):66-70. [24]Sina Weibo.Sunshine credit[EB/OL].http://service.account.weibo.com/sunshine/guize. [25]LIAN J,ZHOU X,CAO W,et al.SINA microblog data retrieval[J].Journal of Tsinghua University,2011,51(10):1300-1305.(in Chinese) 廉捷,周欣,曹伟,等.新浪微博数据挖掘方案[J].清华大学学报(自然科学版),2011,51(10):1300-1305. [26]YANG M,YIN J M,JI G L.Classification Methods on Imba- lanced Data:a Survey[J].Journal of Nanjing Normal University,2008,8(4):7-12.(in Chinese) 杨明,尹军梅,吉根林.不平衡数据分类方法综述[J].南京师范大学学报(工程技术版),2008,8(4):7-12. |
[1] | JIA Lin, YANG Chao, SONG Ling-ling, CHENG Zhenand LI Bei-jun. Improved Negative Selection Algorithm and Its Application in Intrusion Detection [J]. Computer Science, 2021, 48(6): 324-331. |
[2] | ZHANG Min-jun, HUA Qing-yi. Personalized Recommendation of Social Network Users' Interest Points Based on ProbabilityMatrix Decomposition Algorithm [J]. Computer Science, 2020, 47(12): 144-148. |
[3] | YANG Chao and LI Tao. Research of Danger Signal Extraction Based on Changes in Danger Theory [J]. Computer Science, 2015, 42(8): 170-174. |
[4] | CHEN Yan-ling, TANG Guang-ming and SUN Yi-feng. Assessment of Network Security Situation Based on Immune Danger Theory [J]. Computer Science, 2015, 42(6): 167-170. |
[5] | FANG Xian-jin, WANG Li, KANG Jia and LIU Jia. On Dendritic Cell Algorithm and its Theoretical Investigation [J]. Computer Science, 2015, 42(2): 131-133. |
[6] | LIU Nian,LIU Sun-jun,LIU Yong,ZHAO Hui. Method of Network Security Situation Awareness Based on Artificial Immunity System [J]. Computer Science, 2010, 37(1): 126-129. |
[7] | ZHANG Jun-min,LIANG Yi-wen. Worm Detection Immune Model Integrating Innate and Adaptive Immunity [J]. Computer Science, 2009, 36(12): 119-123. |
[8] | CHAI Zheng-yi, WANG Hong-hai. Study of Anomaly Intrusion Detection System on False Positive Rate [J]. Computer Science, 2009, 36(11): 68-70. |
|