參考文獻 |
[1] Taiwan Network Information Center, “A Survey on Broadband Usage in Taiwan 2011,” http://www.twnic.net.tw/download/200307/200307index.shtml
[2] Online MBA, “The Stats on Internet Porn,”
http://www.onlinemba.com/blog/the-stats-on-internet-porn/
[3] Li-Der Chou, Zheng He, Hua-Rong Chu, Neng-Hsing Chen, “Design and Implementation of Content-based Filter on Embedded Linux Gateway,” Proceedings of 2010 Taiwan Academic Network Conference (TANET2010), Tainan, Taiwan, 2010.
[4] Hicare, http://hicare.hinet.net/
[5] Peter Mell, Timothy Grance, “The NIST Definition of Cloud Computing (Draft)”, NIST Special Publication 800-145 (Draft), 2011.
[6] Armbrust, Michael and Fox, Armando and Griffith, Rean and Joseph, Anthony D. and Katz, Randy H. and Konwinski, Andrew and Lee, Gunho and Patterson, David A. and Rabkin, Ariel and Stoica, Ion and Zaharia, Matei, “Above the Clouds: A Berkeley View of Cloud Computing,”
http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
[7] Andy Isherwood, quoted in ZDnet News, December 11, 2008.
[8] Judith Hurwitz, Robin Bloor, Marcia Kaufman, and Fern Halper, “Cloud Computing for Dummies,” For Dummies; 1 edition, 2009.
[9] Cloud computing hype spurs confusion, Gartner says,
http://www.computerworld.com/s/article/9115904/Cloud_computing_hype_spurs_confusion_Gartner_says
[10] Cloud Computing, http://en.wikipedia.org/wiki/Cloud_computing
[11] Amazon Web Services, http://aws.amazon.com
[12] Hinet HiCloud, http://hicloud.hinet.net
[13] NTU Cloud, https://www.cloud.ntu.edu.tw
[14] S. Kim, H. Min, J. Jeon, Y. M. Ro and S. Han, “Malicious Content Filtering Based On Semantic Features,” Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, Busan, Korea, 2009.
[15] J. M. G. Hidalgo, F. C. Garcıa, and E. P. Sanz, “Named Entity Recognition for Web Content Filtering,” Proceedings of International Conference on Applications of Natural Languages to Information Systems, Alicante, Spain, 2005.
[16] M. Kodialam, T. Lakshman and S. Sengupta, “Configuring networks with content filtering nodes with applications to network security,” Proceedings the 24th Annual Conference Sponsored by IEEE Communications Society (INFOCOM), Miami, America. 2005.
[17] J. L. Zhang, D. Y. Fang and L. Li, "Intelligent Content Filtering Model for Network Security Audit System," Proceedings the Second International Workshop on Knowledge Discovery and Data Mining, Moscow, Russia, 2009.
[18] D. Sculley and G. M. Wachman, “Relaxed Online SVMs for Spam Filtering,” Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, Amsterda, Netherlands, 2007.
[19] J. G. Tang and G. P. Xiong, “A Perspective of Applying Autonomia to Content Filtering at Network,” Proceedings of International Conference on Computer Science and Software Engineering, Wuhan, China, 2008.
[20] M. Soriano, B Martinkauppi, S Huovinen and M. Laaksonen, "Using the skin locus to cope with changing illumination conditions in color-based face tracking," Proceedings of the IEEE nordic signal processing symposium, pp. 383-386., 2000.
[21] User-generated Content, http://en.wikipedia.org/wiki/User-generated_content
[22] Web 2.0, http://en.wikipedia.org/wiki/Web_2.0
[23] Google Cache, http://www.googleguide.com/cached_pages.html
[24] Internet Archive, http://www.archive.org/
[25] Yan Liu, Gang Zhao, and Tai Wang, “Architecture Research and Design for the Internet Content Rating Implementation System,” Proceedings of the Second International Workshop on Education Technology and Computer Science (ETCS), Wuhan, China, 2010.
[26] Microsoft Bing Safe Search,
http://www.bing.com/community/site_blogs/b/search/archive/2009/06/12/safe-search-update.aspx
[27] Google SafeSearch,
http://www.google.com/support/websearch/bin/answer.py?answer=510
[28] Taiwan Internet Content Rating Promotion Foundation (TICRF), http://www.ticrf.org.tw/
[29] Internet Association Japan, http://www.iajapan.org/
[30] W3C Platform for Internet Content Selection, http://www.w3.org/PICS/
[31] Internet Content Rating Association, http://www.fosi.org/icra/
[32] M. G. Noll and C. Meinel, “Design and Anatomy of a Social Web Filtering Service,” Proceedings of the forth International Conference on Cooperative Internet Computing (CIC), Hong Kong, China. 2006.
[33] M. G. Noll and C. Meinel, “Building a Scalable Collaborative Web Filter with Free and Open Source Software” Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based System, Bali. Indonesia, Dec. 2008.
[34] Green Dam Youth Escort, http://www.lssw365.net/
[35] Honda Chen, Chia-Wei Chen, “Development of IP and Domain Name Filter using ARM9 Based Embedded System,” The International Conference on Computer and Network Technologies in Education, Chung Hua, Taiwan, 2009.
[36] 彭炳衡, 劉懷仁, 魏煥雲, “Linux 作業系統之內容過濾效能之改善,” Journal of Information Technology and Applications, Vol. 2, No. 3, pp. 157-163, 2007.
[37] Internet Content Adaptation Protocol (ICAP), RFC 3507.
[38] Open Pluggable Edge Services (OPES) Use Cases and Deployment Scenarios, RFC 3752.
[39] Modern trends at content filtering, http://alexott.net/en/writings/cf/
[40] Requirements for OPES Callout Protocols, RFC 3836.
[41] Liao-Shuang Kuo, “A DNS Based Pornographic Web Sites Filtering System,” Master thesis, National Central University, 2003.
[42] Zscaler, http://www.zscaler.com/
[43] Network Ingress Filtering: Defeating Denial of Service, RFC 2827
[44] Ingress Filtering for Multihomed Networks, RFC 3704.
[45] The MIT ANA Spoofer project, http://spoofer.csail.mit.edu/index.php
[46] Service Terms of Amazon Web Service, http://aws.amazon.com/serviceterms/
[47] IP in IP Tunneling, RFC 1853, 1995.
[48] Web Cache Communication Protocol,
http://docwiki.cisco.com/wiki/Network_Caching_Technologies#WCCP_Network_Caching
[49] Generic Routing Encapsulation (GRE), RFC 2784, 2000.
[50] Generic Routing Encapsulation (GRE), RFC 1701, 1994.
[51] Broadcom Flexible TCAM-based ContentAware™ Classification technology for affordable security and Access Control List,
http://www.broadcom.com/products/Switching/Home-and-Small-Business/BCM5348
[52] Marvel PRESTERA DX Series, http://www.marvell.com/selector_guide/series20.html
[53] Cisco WAN and Application Optimization Solution Guide Traffic Classification, http://www.cisco.com/en/US/docs/nsite/enterprise/wan/wan_optimization/chap05.html
[54] Dansguardian, http://www.dansguardian.org/
[55] Li-Der Chou, Zheng He, David Chunhu Li, Hui-Fan Chen , Jun-Jie Su Ching-Yung Chen, Hsu-Chuan Wei, Chia-Jen Li, “Performance Analysis of Pornographic Image Recognizing on Cloud Computing Platform,” Proceedings of the 16th Mobile Computing Workshop, Kaosiung, Taiwan, 2011.
[56] Alexa Top Sites in Taiwan, http://www.alexa.com/topsites/countries/TW
|