Abstract
The vast amount of information carried over Mobile Internet and the high speed are providing unprecedented convenience for users, Mobile Internet is facing growing threat of lack of security. It is crucial to maintain and improve safety and security for Mobile Internet for it to thrive and develop. At content level, users are facing increasing amount of malicious or spam content, jeopardizing public’s interest in legitimate internet content. Therefore, Mobile Internet information security has become an important research topic. In this paper we first propose a framework for content security management system for Mobile Internet, and then discuss how to acquire relevant information from Mobile Internet in a fast and efficient manner, how to process and analyze the vast amount of information collected, how to quickly discover negative or illegal information within the network, and provide detection and early warnings for potential hot topics. At the same time, we study how to perform audit and evaluation on the information content so that the relevant security management actions can be done.
Similar content being viewed by others
References
Ganter B., Wille R. (1999) Formal concept analysis-mathematical foundation. Springer, Berlin, New York
Neuss C., Kent R. E. (1995) Conceptual analysis of resource meta-information. Computer Networks And ISDN Systems 27(6): 973–984
Lindig, C., & Snelting, G. (1997). Assessing modular structure of Legacy code based on mathematical concept analysis. In International conference on software engineering (ICES97) (pp. 349–359). Boston, USA.
Missaoui R., Godin R. (1994) Extracting exact and approximate rules from databases, incompleteness and uncertainty in information systems. Springer, London, pp 209–222
Baeza-Yates R., Ribeiro-Neto B. (1999) Modern information retrieval. ACM Press, New York
Shkapenyuk, V., & Suel, T. (2002). Design and implementation of a high-performance distributed web crawler. In Proceedings of the 18th international conference on data engineering (pp. 357–368). California, USA.
Wan, Y., & Tong, H. (2008). URL assignment algorithm of crawler in distributed system based on hash. In IEEE international conference on networking, sensing and control, 2008. ICNSC 2008 (pp. 1632–1635).
Guo J. (2009) Web search. Higher Education Press, China
Zelle, J. M. (1995). Using inductive logic programming to automate the construction of natural language parsers (pp. 96–249). Ph.D. thesis, Department of Computer Sciences, University of Texas at Austin.
Zelle J. M., Mooney R. J. (1996) Learning to parse database queries using inductive logic programming. AAAI/IAAI 2: 1050–1055
Katz, B., Lin, J. J., & Felshin, S. (2002). The START multimedia information system: Current technology and future directions. In Proceedings of the International Workshop on Multimedia Information Systems (MIS) (pp. 117–123).
Jones, C., Abdelmoty, A., Finch, D., Fu, G., & Vaid, S. (2004). The SPIRIT spatial search engine: Architecture, ontologies and spatial indexing. In Proceedings of the third international conference on geographic information science (pp. 125–139).
Jones, C., Purves, R., Ruas, A., Sanderson, M., Sester, M., van Kreveld, M., et al. (2002). Spatial information retrieval and geographical ontologies—an overview of the SPIRIT project. In Proceedings of the 25th annual international conference on research and development in information retrieval.
Li, Z. (2009). Research on geographic information retrieval. Ph.D. thesis, University of Science and Technology of China.
Luo, W., Liu, Q., & Cheng, X. (2003). Development and analysis of technology of topic detection and tracking. In Proceedings of the JSCL 2003 (pp. 560–566). China, Beijing: Tsinghua University.
Yu H., Yu Z., Liu T., Li S. (2007) Topic detection and tracking review. Journal of Chinese Information Processing 6(21): 77–79
Allan, J., Carbonell, J., Doddington, G., Yamron, J., & Yang, Y. (1998). Topic detection and tracking pilot study: Final report. In Proceedings of the DARPA broadcast news transcription and understanding workshop (pp. 194–218). Lansdowne, Virginia.
Allan, J., Lavrenko, V., & Swan, R. (2002). Explorations within topic tracking and detection. In Topic detection and tracking: Event-based information organization(pp. 197–224). Massachusetts: Kluwer.
Kumaran, & G., Allan, J. (2004). Text classification and named entities for new event detection. In Proceedings of the SIGIR conference on research and development in information retrieval (pp. 297–304). ACM: Sheffield, South Yorkshire.
Allan, J., Jin, H., Rajman, M., Wayne, C., Hoberman, G., & Caputo, D. (1999). Topic-based novelty detection. In Proceedings of the Johns Hopkins summer workshop, CLSP, Baltimore.
Yang, Y., Carbonell, J., & Jin, C. (2002). Topic-conditioned novelty detection. In Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 688–693). ACM Press: New York.
Lam W., Meng H., Wong K., Yen J. (2001) Using contextual analysis for news event detection. International Journal on Intelligent Systems 16(4): 525–546
Felzenszwalb P., Huttenlocher D. (2005) Representation and detection of deformable shapes. IEEE Transactions on Pattern Analysis and Machine Intelligence 27(2): 208–220
Yang J., Frangi A., Yang J. (2005) KPCA plus LDA: A complete kernel Fisher discriminant framework for feature extraction and recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 27(2): 230–244
Brendan J. F., Delbert D. (2007) Clustering by passing messages between data points. Science 315: 972–976
Seung H., Lee D. (2000) The manifold ways of perception. Science 290(12): 2268–2269
Roweis S., Saul L. (2000) Nonlinear dimensionality reduction by locally linear embedding. Science 290(12): 2323–2326
Ye J., Li Q. (2005) A two-stage linear discriminant analysis via QR decomposition. IEEE Transactions on Pattern Analysis and Machine Intelligence 27(6): 929–941
Guo, J., Guo, H., & Wang, Z. (2011). An activation force-based affinity measure for analyzing complex networks. Scientific report, 1, 113. http://www.nature.com/srep/2011/111012/srep00113/full/srep00113.html.
Deng W., Guo J., Hu J., Zhang H. (2008) Comment on “100% accuracy in automatic face recognition”. Science 321(8): 912c
Li F., Fergus R., Perona P. (2006) One-shot learning of object categories. IEEE Transactiopns on Pattern Analysis and Machine Intelligence 28(4): 594–611
Carneiro G., Chan A., Moreno P., Vasconcelos N. (2007) Supervised learning of semantic classes for image annotation and retrieval. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(3): 394–410
Liu, Z., Zavesky, E., Gibbon, D., Shahraray, B., & Haffner, P. (2007). AT&T Research at TRECVID 2007. In Online proceedings of TRECVID.
Turnbull, D., Barrington, L., Torres, D., & Lanckriet, G. (2007). Towards musical query by semantic description using the CAL500 data set. In SIGIR 2007 proceedings (pp. 439–446).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Xu, Q., Guo, J. & Xiao, B. The Study of Content Security for Mobile Internet. Wireless Pers Commun 66, 523–539 (2012). https://doi.org/10.1007/s11277-012-0738-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-012-0738-8