共查询到20条相似文献,搜索用时 78 毫秒
1.
利用电子邮件的特点提出了一种面向电子邮件分类处理的特征值提取方法。本方法根据电子邮件文法随意性的特点,利用模糊集合对其同义词和多义现象都进行了处理,使得所得到的特征值能更好的契合文本的特点。通过与其它特征值提取方法的比较实验,以及在不同分类算法中应用实验结果都证明文中提出的特征值提取方法能够提高电子邮件分类处理的正确率,并达到有效降低特征向量维数的目的。 相似文献
2.
3.
垃圾邮件的泛滥提出了极为迫切的技术诉求。文章介绍了基于神经网络的垃圾邮件过滤系统模型,并首先介绍了整个系统工作流程,然后阐述了系统中文本分词、文本特征提取、神经网络分类器等关键环节。神经网络的自学习。自适应能力解决了垃圾邮件特征不断变化而过滤方法相时固定的矛盾。 相似文献
4.
5.
6.
目前性能较好的多分类算法有1-v-r支持向量机(SVM)、1-1-1SVM、DDAG SVM等,但存在大量不可分区域且训练时间较长的问题。提出一种基于二叉树的多分类SVM算法用于电子邮件的分类与过滤,通过构建二叉树将多分类转化为二值分类,算法采用先聚类再分类的思想,计算测试样本与子类中心的最大相似度和子类间的分离度,以构造决策节点的最优分类超平面。对于C类分类只需C-1个决策函数,从而可节省训练时间。实验表明,该算法得到了较高的查全率、查准率。 相似文献
7.
8.
针对网络不良文本信息的过滤问题提出了一种基于文本倾向性的不良文本识别方法.首先采用基于主题的文本分类方法,然后对不良主题的相关文本利用倾向性分析方法识别不良文本.基于文本倾向性由文本主题词的上下文词汇确定的假设,提出了一种基于主题词上下文的文本倾向性分类方法.实验结果显示该方法对已有基于主题分类方法很难区分的文本具有较好识别效果. 相似文献
9.
10.
一种基于域名的非法网站过滤技术 总被引:1,自引:0,他引:1
近年来,因特网上有大量包含非法或者不健康信息的网站,对非法网站进行过滤尤为重要。通常的做法是利用网页中记载的信息对网站进行分类,论文提出一种基于N-gram的朴素贝叶斯分类器,利用网站的域名对网站进行分类。作者采用该方法来自动识别包含不健康信息或非法信息的网站,实验结果证明,该方法具有相当的准确度。目前,该方法已经应用到某软件公司的网络防火墙产品中。 相似文献
11.
电子邮件作为互联网技术发展的产物,在给全球网民带来通讯便利的同时,正不可避免地遭遇有悖初衷的运用。最为突出的是随之产生的垃圾邮件像瘟疫一样蔓延,污染网络环境,占用大量传输、存储和运算资源,影响了网络的正常运行。垃圾邮件问题日益严重,受到研究人员的广泛关注。基于内容的过滤是当前解决垃圾邮件问题的主流技术之一。由于常用的特征字串匹配技术对垃圾邮件件的查准率已经不能满足日益提高的过滤系统用户的产品需求,随后引入邻近类别分类的方法,利用基于贝叶斯算法的电子邮件过滤系统,对色情垃圾邮件样本进行分析,可明显提高对垃圾邮件的查准率。 相似文献
12.
An Operable Email Based Intelligent Personal Assistant 总被引:1,自引:0,他引:1
The recent phenomena of email-function-overloading and email-centricness in daily life and business have created new problems
to users. There is a practical need for developing a software assistant to facilitate the management of personal and organizational
emails, and to enable users to complete their email-centric jobs or tasks smoothly. This paper presents the status, goals,
and key technical elements of an Email-Centric Intelligent Personal Assistant, called ECIPA. ECIPA provides various assisting
functions, including automated and cost-sensitive spam filtering based on corresponding analysis, ontology-mediated email
classification, query and archiving. ECIPA can learn from dynamic user behaviors to effectively sort and automatically respond
email. Techniques developed in Web Intelligence (WI) are adopted to implement ECIPA. In order to facilitate cooperation of
ECIPAs of different users, the concept of operable email, an extension of traditional email with an operable form, is introduced. ECIPA can in fact be viewed as a family of collaborative agents working together on the operable email. 相似文献
13.
电子邮件审计系统的实现研究 总被引:2,自引:0,他引:2
电子邮件的审计是网络信息安全的重要方面.本文从当前电子邮件的编码出发,分析了基于内容的电子邮件审计系统的不同实现方案,对所开发的基于多关键字和特定电子邮件地址的审计系统进行了阐述,最后给出了系统的进一步改进方案. 相似文献
14.
15.
基于文本字体的信息隐藏算法 总被引:4,自引:0,他引:4
研究了文本信息隐藏技术,提出一种改进的改变文本载体字符字体的隐藏算法。该算法首先把秘密文本信息中的字符转换为ASCII码,再把ASCII码转化16位二进制码,然后把16位二进制码的高八位和低八位转换为十进制数,用RSA加密法将十进制数加密,最后把十进制码再转换成16位二进制码并利用伪随机置换法把秘密信息代码嵌入到载体文本中。嵌入时选取两种字体,若代码为“1”,载体文本的字体不变,若为“0”则改为一种与原字体相近的字体。通过这些处理手段大大提高了单纯的基于特征编码的信息隐藏技术的安全性。 相似文献
16.
17.
ABSTRACT Information security culture develops in an organization due to certain actions taken by the organization. Management implements information security components, such as policies and technical security measures with which employees interact and that they include in their working procedures. Employees develop certain perceptions and exhibit behavior, such as the reporting of security incidents or sharing of passwords, which could either contribute or be a threat to the securing of information assets. To inculcate an acceptable level of information security culture, the organization must govern information security effectively by implementing all the required information security components. This article evaluates four approaches towards information security governance frameworks in order to arrive at a complete list of information security components. The information security components are used to compile a new comprehensive Information Security Governance framework. The proposed governance framework can be used by organizations to ensure they are governing information security from a holistic perspective, thereby minimising risk and cultivating an acceptable level of information security culture. 相似文献
18.
《Information Systems Management》2007,24(4):361-372
Information security culture develops in an organization due to certain actions taken by the organization. Management implements information security components, such as policies and technical security measures with which employees interact and that they include in their working procedures. Employees develop certain perceptions and exhibit behavior, such as the reporting of security incidents or sharing of passwords, which could either contribute or be a threat to the securing of information assets. To inculcate an acceptable level of information security culture, the organization must govern information security effectively by implementing all the required information security components. This article evaluates four approaches towards information security governance frameworks in order to arrive at a complete list of information security components. The information security components are used to compile a new comprehensive Information Security Governance framework. The proposed governance framework can be used by organizations to ensure they are governing information security from a holistic perspective, thereby minimising risk and cultivating an acceptable level of information security culture. 相似文献
19.
20.
研究基于文本的信息隐藏技术,对使用文本传输秘密信息,以及版权维护等方面有很大的实用价值。文本,作为信息隐藏的载体,相对于视频、图像和声音,其冗余度更小,所以基于文本的信息隐藏技术发展相对较慢。新的文本文档格式的出现对基于文本的信息隐藏提供了更多的方法和可能。文中研究分析了一种新的文本文档格式——Word 2007采用的Microsoft Office Word XML格式,提出并实现了一种基于Word 2007字体大小微调的可无源检测的信息隐藏方案和算法。理论分析和实验表明算法有效可靠,具有良好的隐蔽性。 相似文献