Netinfo Security ›› 2019, Vol. 19 ›› Issue (9): 51-55.doi: 10.3969/j.issn.1671-1122.2019.09.011
• Orginal Article • Previous Articles Next Articles
Chunhe TAO1, Xi ZHANG2, Zhen WANG1, Xiaoying GAN2
Received:
2019-07-15
Online:
2019-09-10
Published:
2020-05-11
CLC Number:
Chunhe TAO, Xi ZHANG, Zhen WANG, Xiaoying GAN. Research on Analysis Method of Fund Trading Network[J]. Netinfo Security, 2019, 19(9): 51-55.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2019.09.011
[1] | MATHIEU Jacomy. Gephi[EB/OL]., 2018-4-22. |
[2] | IBM. I2 Analyst’s Notebook[EB/OL]. , 2018-4-22. |
[3] | IBM. The CLEVER Project. [EB/OL]. , 2018-4-22. |
[4] | DING C, HE Xiaofeng, HUSBANDS P, et al.PageRank, HITS and a Unified Framework for Link Analysis[C]//ACM. 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, August 11-15, 2002, Tampere, Finland. New York: ACM, 2002: 353-354. |
[5] | CHANG Qing, ZHOU Mingquan, GENG Guohua.Web Search Based on PageRank and HITS[J]. Computer Technology and Development, 2008, 18(7): 77-79. |
常庆,周明全,耿国华.基于PageRank和HITS的Web搜索[J].计算机技术与发展,2008,18(7):77-79. | |
[6] | ZHANG Jun, ACKERMAN M S, ADAMIC L.Expertise Networks in Online Communities: Structure and Algorithms[C]//ACM. 16th International Conference on World Wide Web, May 8-12, 2007, Banff, Alberta, Canada. New York: ACM, 2007: 221-230. |
[7] | ZHANG Junhao, GUN Yijun, ZHANG Shihao, et al.User Impact Assessment of Micro-blog Based on PageRank and User Behavior[J]. Netinfo Security, 2015, 15(6): 73-78. |
张俊豪,顾益军,张士豪,等.基于PageRank和用户行为的微博用户影响力评估[J].信息网络安全,2015,15(6):73-78. | |
[8] | LAWRENCE P, SERGEY B, RAJEEV M, et al. The PageRank Citation Ranking: Bringing Order to the Web[EB/OL]. , 2018-4-22. |
[9] | RICHARDSON M, DOMINGOS P.The Intelligent Surfer: Probabilistic Combination of Link and Content Information in Pagerank[C]//ACM. 14th International Conference on Neural Information Processing Systems: Natural and Synthetic, December 3-8, 2001, Vancouver, British Columbia, Canada. New York: ACM, 2002: 1441-1448. |
[10] | HAVELIWALA T H. Topic-sensitive Pagerank[EB/OL]. , 2018-4-22. |
[11] | KLEINBERG J M.Authoritative Sources in a Hyperlinked Environment[J]. Journal of the ACM(JACM), 1999, 46(5): 604-632. |
[12] | NG A Y, ZHENG A X, JORDAN M I. Stable Algorithms for Link Analysis[EB/OL]. , 2018-4-22. |
[13] | XIAN Xiaoping.Research on Search Engine PageRank Algorithm[D]. Xi’an: Northwestern University, 2010. |
县小平. 搜索引擎PageRank算法研究[D].西安:西北大学,2010. | |
[14] | CAI Jianchao, CAI Ming.Research on Search Engine PageRank Algorithm[J]. Computer Applications and Software, 2008, 25(9): 59-60. |
蔡建超,蔡明.搜索引擎PageRank算法研究[J].计算机应用与软件,2008,25(9):59-60. | |
[15] | HE Xiaoyang, WU Qiang WU Zhirong. HITS Algorithm and PageRank Algorithm Comparative Analysis[J]. Journal of Intelligence, 2004, 23(2): 85-86. |
何晓阳,吴强,吴治蓉. HITS算法与PageRank算法比较分析[J].情报杂志,2004,23(2):85-86. | |
[16] | YU Yi, GAN Ruoxun, FAN Suohai, et al.Journal Evaluation Based on PageRank Algorithm and HITS Algorithm[J]. Computer Science, 2014, 41(s1): 110-113. |
喻依,甘若迅,樊锁海,等.基于PageRank算法和HITS算法的期刊评价研究[J].计算机科学,2014,41(s1):110-113. |
[1] | Zhiyan ZHAO, Xiaomo JI. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[2] | Min LIU, Shuhui CHEN. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[3] | Lingyu BIAN, Linlin ZHANG, Kai ZHAO, Fei SHI. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[4] | Yifeng DU, Yuanbo GUO. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[5] | Zhizhou FU, Liming WANG, Ding TANG, Shuguang ZHANG. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[6] | Rong WANG, Chunguang MA, Peng WU. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | Xiaoli DONG, Shuai SHANG, Jie CHEN. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[8] | Chun GUO, Changqing CHEN, Guowei SHEN, Chaohui JIANG. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[9] | Lu CHEN, Yajie SUN, Liqiang ZHANG, Yun CHEN. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[10] | Jinfang JIANG, Guangjie HAN. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[11] | Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[12] | Peng LIU, Qian HE, Wangyang LIU, Xu CHENG. CP-ABE Scheme Supporting Attribute Revocation and Outsourcing Decryption [J]. Netinfo Security, 2020, 20(3): 90-97. |
[13] | Yubo SONG, Ming FAN, Junjie YANG, Aiqun HU. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | Tengfei WANG, Manchun CAI, Tianliang LU, Ting YUE. IPv6 Network Attack Source Tracing Method Based on iTrace_v6 [J]. Netinfo Security, 2020, 20(3): 83-89. |
[15] | Yi ZHANG, Hongyan LIU, Hequn XIAN, Chengliang TIAN. A Cloud Storage Encrypted Data Deduplication Method Based on Authorization Records [J]. Netinfo Security, 2020, 20(3): 75-82. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||