Citation: | Gaolei FEI, Yameng ZHANG, Zhiyu HU, Lei ZHOU, Guangmin HU. Geographical Location Recognition of IP Based on Network Structure Features[J]. Journal of Electronics & Information Technology, 2019, 41(5): 1235-1242. doi: 10.11999/JEIT180589 |
张少波, BHUIYAN M Z A, 刘琴, 等. 移动社交网络中基于代理转发机制的轨迹隐私保护方法[J]. 电子与信息学报, 2016, 38(9): 2158–2164. doi: 10.11999/JEIT151136
ZHANG Shaobo, BHUIYAN M Z A, LIU Qin, et al. The method of trajectory privacy preserving based on agent forwarding mechanism in mobile social networks[J]. Journal of Electronics &Information Technology, 2016, 38(9): 2158–2164. doi: 10.11999/JEIT151136
|
王荣荣. 基于位置的社交网络隐私安全研究[D]. [硕士论文], 华东师范大学, 2016. 15-31.
WANG Rongrong. Research on location based social network privacy security [D]. [Master dissertation], East China Normal University, 2016. 15-31.
|
李晴, 叶阿勇, 许力. 社交网络中基于定位欺骗的隐私攻击研究[J]. 信息网络安全, 2017, 1(5): 51–56. doi: 10.3969/j.issn.1671-1122.2017.05.008
LI Jing, YE Ayong, and XU Li. Research on privacy attack based on location cheating in social network[J]. Information Network Security, 2017, 1(5): 51–56. doi: 10.3969/j.issn.1671-1122.2017.05.008
|
MUIR J A and OORSCHOT P C V. Internet geolocation: Evasion and counterevasion[J]. ACM Computing Surveys, 2009, 42(1): 1–23. doi: 10.1145/1592451.1592455
|
PADANABHAN V N and SUBRAMANIAN L. An investigation of geographic mapping techniques for internet hosts[J]. ACM Sigcomm Computer Communication Review, 2001, 31(4): 173–185. doi: 10.1145/964723.383073
|
GUEYE B, ZIVIANI A, CROVELLA M, et al. Constraint-based geolocation of internet hosts[J]. IEEE/ACM Transactions on Networking, 2006, 14(6): 1219–1232. doi: 10.1109/TNET.2006.886332
|
ZHOU Haifeng, TAN Liansheng, et al. Traffic matrix estimation: Advanced—Tomogravity method based on a precise gravity model[J]. International Journal of Communication Systems, 2015, 28(10): 1709–1728. doi: 10.1002/dac.2787
|
朱畅华, 裴昌幸, 李建东, 等. 基于线性规划的Internet端到端时延的估计[J]. 电子与信息学报, 2004, 26(3): 446–452.
ZHU Changhua, PEI Changxing, LI Jiandong, et al. Linear programming based estimation of internet end-to-end delay[J]. Journal of Electronics &Information Technology, 2004, 26(3): 446–452.
|
KATZBASSET E, JOHN J P, KRISHNAMURTHY A, et al. Towards IP geolocation using delay and topology measurements[C]. ACM SIGCOMM Conference on Internet Measurement 2006, Rio De Janeriro, Brazil, 2006: 71–84.
|
ERIKSSON B, BARFORD P, SOMMERS J, et al. A learning-based approach for IP geolocation[C]. Passive and Active Measurement, International Conference, Zurich, Switzerland, 2010: 171–180.
|
CHEN Jingning, LIU Fenlin, WANG Tianpeng, et al. Towards region-level IP geolocation based on the path feature[C]. International Conference on Advanced Communication Technology IEEE, PyeongChang, South Korea, 2015: 468–471.
|
REN Lianxing. Method for IP geolocation based on Path Similarity[C]. International Conference on Wireless Communication and Sensor Networks. Boston, USA, 2017: 315–319.
|
CHUN B, CULLER D, ROSCOE T, et al. PlanetLab: an overlay tested for broad-coverage services[J]. ACM SIGCOMM Computer Communication Review, 2003, 33(3): 3–12. doi: 10.1145/956993.956995
|
谢钧, 俞璐, 金凤林. 基于排队时延和丢包率的拥塞控制[J]. 电子与信息学报, 2010, 32(9): 2058–2064. doi: 10.3724/SP.J.1146.2009.01228
XIE Jun, YU Lu, and JIN Fenglin. Congestion control based on queuing delay and packet Loss probability[J]. Journal of Electronics &Information Technology, 2010, 32(9): 2058–2064. doi: 10.3724/SP.J.1146.2009.01228
|
SHAVITT Y and ZILBERMAN N. Geolocation Databases Study[J]. IEEE Journal on Selected Areas in Communications, 2011, 29(10): 2044–2056. doi: 10.1109/JSAC.2011.111214
|
赵帆, 罗向阳, 刘粉林. 网络空间测绘技术研究[J]. 网络与信息安全学报, 2016, 2(9): 1–11. doi: 10.11959/j.issn.2096-109x.2016.00097
ZHAO Fan, LUO Xiangyang, and LIU Fenlin. Research on cyberspace surveying and mapping technology[J]. Chinese Journal of Network and Information Security, 2016, 2(9): 1–11. doi: 10.11959/j.issn.2096-109x.2016.00097
|