浏览全部资源
扫码关注微信
[ "王奕钧(1983-),男,公安部第一研究所工程师,主要研究方向为网络信息安全。" ]
网络出版日期:2016-05,
纸质出版日期:2016-05-20
移动端阅览
王奕钧. 基于Wi-Fi协议的历史轨迹探测系统的研究与实现[J]. 电信科学, 2016,32(5):186-190.
Yijun WANG. Research and implementation of the historical trajectory detection system based on Wi-Fi protocol[J]. Observation and communication, 2016, 32(5): 186-190.
王奕钧. 基于Wi-Fi协议的历史轨迹探测系统的研究与实现[J]. 电信科学, 2016,32(5):186-190. DOI: 10.11959/j.issn.1000-0801.2016146.
Yijun WANG. Research and implementation of the historical trajectory detection system based on Wi-Fi protocol[J]. Observation and communication, 2016, 32(5): 186-190. DOI: 10.11959/j.issn.1000-0801.2016146.
历史轨迹探测对于商业用户行为分析、警务嫌疑人身份落地及重点人布控都有着重要作用和现实意义。目前的探测方式或采用移动客户端静默搜集用户信息,或采用运营商分流数据,或采用摄像头拍摄结合人工分析等方式,这些探测方式存在着采集样本受限、提取有效信息困难、分析效率低下等各种弊端。提出了一种基于Wi-Fi协议的历史轨迹探测方式,并给出具体的系统设计与功能实现,为商业分析、警务应用提供一种新的分析用户行为的途径。
The historical trajectory detection plays a vital role and has the practical significance for commercial userbehavior analysis, the identity of the police suspect landing and surveillance of key. Current detection methods usemobile client silence to collect user information, or use operators to shunt data, or shooting combined with artificialanalysis. The ways have many disadvantages such as the sample is limited, the effective information is difficult toextract and the analytical efficiency is low. A historical track detection based on Wi-Fi protocol was proposed, andspecific system design and function relization were given which provided a new way to analyze the behavior of users.
周天彤 , 李强 , 郑东 . 对无线网络移动认证协议的分析与改进 [J ] . 计算机应用与软件 , 2012 , 29 ( 3 ): 19 - 21 .
ZHOU T T , LI Q , ZHENG D . The analysis and improvement of wireless mobile network authentication protocol [J ] . Computer Applications and Software , 2012 29 ( 3 ): 19 - 21 .
BHARDWAJ J . What is your phone saying behind your back [EB/OL ] . ( 2012 - 10 - 02 )[ 2015 - 09 - 20 ] . http://nakedsecurity.sophos.com/2012/10/02/what-is-your-phone-saying-behind-your-back/,2012-10 http://nakedsecurity.sophos.com/2012/10/02/what-is-your-phone-saying-behind-your-back/,2012-10 .
SIDIROPOULOS N , MIODUSZEWSKI M , SCHAAP E . Open Wi-Fi SSID broadcast vulnerability [EB/OL ] . ( 2012 - 12 - 24 )[ 2015 - 09 - 20 ] . http://nakedsecurity.sophos.com/2012/10/02/what-is-your-phone-saying-behind-your-back/,2012-10 http://nakedsecurity.sophos.com/2012/10/02/what-is-your-phone-saying-behind-your-back/,2012-10 .
PISCATAWAY N . Wireless LAN medium access control(MAC)and physical layer(PHY)specifications [J ] . IEEE Computer Society , 2012 : C1 - 1184 .
李婷 , 裴韬 , 袁烨城 , 等 . 人类活动轨迹分类、模式和应用研究综述 [J ] . 地理科学进展 , 2014 , 33 ( 7 ): 938 - 948 .
LI T , PEI T , YUAN Y C et al . Research of human activity trajectory classification、patterns and applications [J ] . Progress in Geography, , 2014 33 ( 7 ): 938 - 948 .
0
浏览量
878
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构