计算机技术 |
|
|
|
|
园区网风险账号评估方法 |
曾煌尧1(),李丹丹1,马严1,*(),丛群2 |
1. 北京邮电大学 网络技术研究院,北京 100876 2. 北京网瑞达科技有限公司,北京 100082 |
|
Risky accounts evaluation method of campus network |
Huang-yao ZENG1(),Dan-dan LI1,Yan MA1,*(),Qun CONG2 |
1. Information Network Center, Institute of Network Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China 2. Beijing Wrdtech Co. Ltd, Beijing 100082, China |
引用本文:
曾煌尧,李丹丹,马严,丛群. 园区网风险账号评估方法[J]. 浙江大学学报(工学版), 2020, 54(9): 1761-1767.
Huang-yao ZENG,Dan-dan LI,Yan MA,Qun CONG. Risky accounts evaluation method of campus network. Journal of ZheJiang University (Engineering Science), 2020, 54(9): 1761-1767.
链接本文:
http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2020.09.012
或
http://www.zjujournals.com/eng/CN/Y2020/V54/I9/1761
|
1 |
白阳 高校园区网的规划与构建[J]. 航海教育研究, 2010, 27 (1): 111- 112 BAI Yang Planning and construction of university campus network[J]. Maritime Education Research, 2010, 27 (1): 111- 112
doi: 10.3969/j.issn.1006-8724.2010.01.043
|
2 |
WANG D, WANG P Two birds with one stone: two-factor authentication with security beyond conventional bound[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 15 (4): 708- 722
|
3 |
MILLS J U, STUBAN S M F, DEVER J Predict insider threats using human behaviors[J]. IEEE Engineering Management Review, 2017, 45 (1): 39- 48
doi: 10.1109/EMR.2017.2667218
|
4 |
SIADATI H, SAKET B, MEMON N. Detecting malicious logins in enterprise networks using visualization [C] // 2016 IEEE Symposium on Visualization for Cyber Security (VizSec). Baltimore: IEEE, 2016: 1-8.
|
5 |
ZHOU Y, KIM D W, ZHANG J, et al Proguard: detecting malicious accounts in social-network-based online promotions[J]. IEEE Access, 2017, 5: 1990- 1999
doi: 10.1109/ACCESS.2017.2654272
|
6 |
FREEMAN D, JAIN S, DURMUTH M, et al. Who Are You? A statistical approach to measuring user authenticity [C] // The Network and Distributed System Security Symposium (NDSS) 2016. San Diego: NDSS, 2016: 1-15.
|
7 |
章思宇, 黄保青, 姜开达 统一身份认证日志集中管理与账号风险检测[J]. 东南大学学报: 自然科学版, 2017, 47 (S1): 113- 117 ZHANG Si-yu, HUANG Bao-qing, JIANG Kai-da Unified identity authentication log centralized management and account risk detection[J]. Journal of Southeast University: Natural Science Edition, 2017, 47 (S1): 113- 117
|
8 |
陈嵩, 王怡 高校统一身份认证中的账号安全研究[J]. 福建师大福清分校学报, 2017, (4): 100- 105 CHEN Song, WANG Yi Research on account security in university unified identity authentication[J]. Journal of Fujian Normal University Fuqing Branch, 2017, (4): 100- 105
doi: 10.3969/j.issn.1008-3421.2017.04.019
|
9 |
聂荣, 余建国, 张洪欣, 等 IP地址地理位置映射技术[J]. 计算机工程, 2008, 34 (15): 102- 104 NIE Rong, YU Jian-guo, ZHANG Hong-xin, et al IP address geolocation mapping technology[J]. Computer Engineering, 2008, 34 (15): 102- 104
doi: 10.3969/j.issn.1000-3428.2008.15.036
|
10 |
STAUFFER C, GRIMSON W E L. Adaptive background mixture models for real-time tracking [C] // Proceedings of 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149). Fort Collins: IEEE, 1999: 246-252.
|
11 |
岳佳, 王士同 高斯混合模型聚类中EM算法及初始化的研究[J]. 微计算机信息, 2006, (33): 244- 246 YUE Jia, WANG Shi-tong Research on EM algorithm and initialization in Gaussian mixture model clustering[J]. Microcomputer information, 2006, (33): 244- 246
doi: 10.3969/j.issn.1008-0570.2006.33.086
|
12 |
王源, 陈亚军 基于高斯混合模型的EM学习算法[J]. 山西师范大学学报: 自然科学版, 2005, 19 (1): 46- 49 WANG Yuan, CHEN Ya-jun EM learning algorithm based on Gaussian mixture model[J]. Journal of Shanxi Normal University: Natural Science Edition, 2005, 19 (1): 46- 49
|
13 |
武光达, 蒋朝惠 基于 DPI 的流量识别系统的研究[J]. 信息网络安全, 2014, 14 (10): 44- 48 WU Guang-da, JIANG Zhao-hui Research on DPI-based traffic identification system[J]. Information Network Security, 2014, 14 (10): 44- 48
doi: 10.3969/j.issn.1671-1122.2014.10.008
|
14 |
马宏伟, 张光卫, 李鹏 协同过滤推荐算法综述[J]. 小型微型计算机系统, 2009, 30 (7): 1282- 1288 MA Hong-wei, ZHANG Guang-wei, LI Peng A survey of collaborative filtering recommendation algorithms[J]. Small Microcomputer System, 2009, 30 (7): 1282- 1288
|
15 |
邢春晓, 高凤荣, 战思南, 等 适应用户兴趣变化的协同过滤推荐算法[J]. 计算机研究与发展, 2007, 44 (2): 296- 301 XING Chun-xiao, GAO Feng-rong, ZHAN Si-nan, et al Collaborative filtering recommendation algorithm adapted to changes in user interest[J]. Computer Research and Development, 2007, 44 (2): 296- 301
doi: 10.1360/crad20070216
|
16 |
DEHAK N, DEHAK R, GLASS J R, et al. Cosine similarity scoring without score normalization techniques [C] // The Speaker and Language Recognition Workshop (Odyssey 2010). Brno: IEEE, 2010: 71-75.
|
17 |
梁天一, 梁永全, 樊健聪, 等 基于用户兴趣模型的协同过滤推荐算法[J]. 计算机应用与软件, 2014, 31 (11): 260- 263 LIANG Tian-yi, LIANG Yong-quan, FAN Jian-cong, et al Collaborative filtering recommendation algorithm based on user interest model[J]. Computer Applications and Software, 2014, 31 (11): 260- 263
doi: 10.3969/j.issn.1000-386x.2014.11.066
|
18 |
JAIN A, NANDAKUMAR K, ROSS A Score normalization in multimodal biometric systems[J]. Pattern Recognition, 2005, 38 (12): 2270- 2285
doi: 10.1016/j.patcog.2005.01.012
|
19 |
孙德山 支持向量机分类与回归方法研究[J]. 中南大学学报, 2004, 35 (6): 13- 15 SUN De-shan Research on support vector machine classification and regression method[J]. Journal of Central South University, 2004, 35 (6): 13- 15
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|