中国tianyaclub

tianyaclub  时间:2021-01-30  阅读:()
DynamicMonitoringModelforBBSContentSecurity*JingYu,YanpingZhaoSchoolofManagement&EconomicsBeijingInstituteofTechnologyBeijingP.
R.
Chinapaopaofish@bit.
edu.
cn,zhaoyp@bit.
edu.
cnAbstract:-BulletinBoardService(BBS)communityshouldbeaharmoniouspublicspeakinglocationfullofharmlessopinions.
ThispaperanalyzesthecharacteristicsofarticlecontentinBBS,especiallyforChineseLanguage,andproposesanoveldynamicmonitoringmodelforBBScontentsecurity.
Themodelisbasedonafastmulti-patternmatchingalgorithm,andusesacombinedapproachofTextFiltering,SocialNetworkAnalysis(SNA)andspotinvestigatingmethod.
Thesystemcandiscoverillegalarticleefficiently,andidentifydangerpersonsandthebehaviorpatterndynamically.
Key-Words:-BBS;Contentsecurity;Multi-patternmatch;SNA*ThisresearchissupportedbytheNationalNaturalScienceFoundationofChina(70471064),andResearchFoundationofBeijingInstituteofTechnology(BIT-UBF-200308G10).
1IntroductionTheoryresearchesandpracticeapplicationsaboutcontentsecurityfilteringmainlyaimatordinaryWWWtextsorEmail.
However,theexistingmethodsandtechnologiesarenotverysatisfactoryinviewofBBStexts.
Thereasonsasfollows:Firstly,thearticlecontentofBBSisdisplayedincisivelyandvividly,anduselargenumbersofshorteningsymbols,fabricatingtermswhichmakethetraditionalfilteringsystemscannotdistinguish.
Secondly,BBShasextremelyquickpublicrespondandspreadspeed,sothatithasdifficultyinmonitoringBBStimelyanddynamically.
Finally,sinceBBSiscomparativelyeasyforusersregisternewaccountsatanymoment,theanalystsareoverwhelmedwiththeincompleteormisleadinginformationfrommanysources,andhavedifficultyindiscoveringtheirrelations.
Thereisaneedtohelptheanalyststoidentifykeydangerpersonswhomaybehaveseveralvirtualaccounts,andtrackandanalyzerelationdataofthem.
ThispaperproposesaninnovativedynamicmonitoringmodelforBBScontentsecurity,whichusesacombinedapproachofTextFiltering,SocialNetworkAnalysis(SNA)andspotinvestigatingmethod,especiallyefficientforChinesenaturallanguage.
Thispaperisorganizedasfollows,insection2,somerelatedworks;section3proposestheframeworkofdynamicmonitoringmodelforBBScontentsecurity;section4,mainlydesignstwocoremodules,onesupportsContentFilterbasedonanovelfastMulti-Patternmatchingalgorithm,theothersupportsLinkAnalyzer;section5,someinitialtestresults;section6,conclusionsandfuturework.
2RelatedWorkRoughlytherearethreekindsofcontentsecurityfilteringtechnologies.
Thefirstiskeyword(s)matchingalgorithms.
ThesecondisstatisticalmethodbasedonVectorSpaceModel(VSM).
Thelastoneisbasedonknowledgebase.
Themostpopularoneissimplepattern(keyword)matchingbasedonSingle-PatternorMulti-Pattern.
Thespeedofpatternmatchingalgorithmisemphasizedinordertomeettheneedofbroadbandinformationfilteringonnetwork.
However,inthepracticalapplicationoffilteringsystem,twoexistingproblemsneedtobesolved.
TheyarehowtomaketherulesforfilteringcontentandwhichkindofpatternmatchingalgorithmismoreefficienttoChineselanguagetexts.
ThesecondfilteringtechnologyisstatisticalmethodbasedonVSM,whichiscomparativelyusedmoreintextclassificationresearchthaninothers.
Theaccuracyisenhancedgreatlythroughtrainingalargeamountofclearlyclassifiedcorpusandconstructingfeaturevector(keywords)torepresenteachclass.
Butthismethodconsumesmoretimeincomputingsimilaritybetweenfeaturevectorsandthatofunknowndocuments[1].
Thetwotechnologiesabove-mentionedhaveacommondisadvantageofnon-semantic.
Thecontentfilteringtechnologybasedonknowledgebaseisbecomingaresearchhotspotallovertheworld.
ThisresearchismoremeaningfultoChinesetextfilteringsinceitisbasedoncharactersetsnotwords.
JinYao-hongusesHierarchicalNetworkofConceptstheory(HNC)[2]andmatchingmethodbasedoncomplicatedChinesesemanticknowledgerules.
Itsaccuracyismorethan90%,butitsefficiencyiscomparativelyratherlow.
Wecanseespeedandaccuracyarebothimportanttothebroadbandnetworkcontentfiltering.
SoitisnecessarytoimprovetheexistingfilteringalgorithmtoadapttoChinesetextefficiently.
Someexpertsworkedonmixturedfilteringmethodresearch[3][4].
OthersapplySNAtechnologytoBBSresearch.
Forexample,VilleH.
Tuulosandetalcombinetopicmodelwithsocialnetworksforchatdatatopicmining[5].
KouZhong-baoandetaldiscoverthe"smallworld"phenomenonofBBS[6].
Buttherehasn'tbeenresearchaboutSNAappliedtoBBScontentsecuritymonitoring.
3FrameworkofDynamicMonitoringforBBSContentSecurity3.
1BBSDataSourceThedatausedinthispaperwascapturedfromTianyaClubBBS,whichisverypopularinP.
R.
China(www.
tianyaclub.
com).
ThetotalnumberofregisteredIDsisabout3,000,000andthenumberofliveusersisoftenover30,000.
SoTianyaClubprovidesaverygooddataresourceforourresearch.
Ingeneral,everyBBSismoreorlesscomposedofsomediscussiongroups(community).
Eachgrouphasaseriesofarticlesorganizedaccordingtodifferenttopics.
Thefirstarticleisinitialarticle.
Othersarereplyarticlesthatcommentsontheinitialone.
EacharticlecontainsaccountID,title,groupinformation,dateandtime,contents.
TheaccountIDofinitialarticleistheusernameofannouncer,whilethatofreplyarticleistheusernameofreplier.
SocialnetworkGemergesbecauseofthereplyrelationamongtheseaccountIDs.
EachaccountIDwhohastakenpartintopicdiscussionisanodevinG.
ThesetofvisV.
AlinkisestablishedbetweentwonodeswhenoneaccountIDrepliestotheother.
EachlinkeisanarcfromreplyIDtoinitialID.
ThesetofeisE.
AsocialnetworkinBBSisasmallworld[6].
3.
2DynamicMonitoringModelforBBSContentSecurityFig.
1presentstheframeworkofdynamicmonitoringmodelforBBScontentsecurity.
Fig.
1FrameworkofdynamicmonitoringmodelforBBScontentsecurity.
Thesystemisaimedatmonitoringterroristsordangerpersons'speechamongallLANuserswhoaccesstheBBSserver,suchasTianyaClub.
Thewholeframeworkincludesfourmodules.
(1)"CaptureandConvertData"moduleThismoduleisinchargeofcapturing,processingandconvertingBBSnetworkdataonthegatewayofLANwithfastdatapacketcaptureandprotocolanalysistechnology.
BasedonthecharacteristicofChineselanguage,the"plasmodium","synonym","meaningless"phenomenonexistsintheBBScontent.
Wegivedefinition1andexplanationhereandtheothersinthefollowingsections.
Definition1:"plasmodium"isaChineselanguagephenomenoninBBS.
Thereareafewofdeliberateinterferentialcharacters,suchas"*",writtenamongChinesecharactersbydangerpersonstoescapethefilteringsystem.
ItisbasedonnoticeablecharacterofChineselanguagedifferentfromEnglishlanguageisthatoneEnglishwordisusuallyequivalenttotwoorthreeChinesecharacters.
Forexample,thecombinationofcharacter"中"and"国"produces"中国"whichmeans"China".
Thiskindofphenomenondoesnotinfluencereaders'understanding,suchas"中*国"("中国"actually).
Butthenegativeinfluenceof"*"isthat"中*国"cannotbematchedbythepatternof"中国".
Sothedataneedtobecleanedoutthesedeliberateinterferentialcharactersafterconverting.
ThecleanedBBSdataisstoredas.
txtfilesintheappointedsitedirectories.
(2)"ExtractInformation"moduleUsefulinformationcontainedin.
txtfilesabove-mentionedisextractedandstoredintodatabase.
Thedataisdividedintotwokindsofinformationwewilldealwith.
Onekindis"title"and"content"thatarethedealingobjectsofContentFiltermodule.
Theotherischaracterinformation,suchas"accountID","data","time"etc.
thatarethedealingobjectsofLinkAnalysismodule.
(3)"ContentFilter"and"LinkAnalyzer"modules"ContentFilter"canmonitorarticlecontentandidentifywhetheranyfilteringruleismatched.
IfthereisaBBSarticlecontainingillegalcontent,therecordofthisspeakerismarkedwithdifferentlevel.
Then"LinkAnalyzer"makesajudgmentthatwhoistheauthoroftheillegalarticle(dangerpersons)andrecordshischaracters.
Alongwiththeexpansionofdangercommunitiesmatchedwithfilteringrules,"LinkAnalyzer"canhelptoanalyzethestatusoftheseaccountIDscharactersaccordingtosomeSNAparametervalues.
Moreover,VisualizationSoftwarecanhelpsimulatecommunitystructureanddiscoverpersons'relations,communitydistribution,informationspreadchannels,behaviorpatternsandinfluencepatterns.
Thefollowingsectionintroducesthesetwocoremodulesindetails.
4TwoCoreModules4.
1Thenovelfastmulti-patternmatchingalgorithmSpeedisveryimportantinsecurityfilteringapplication.
Asystemwithlowefficiencycannotperformwellinmonitoring.
MostpopularfastmatchingalgorithmsarebasedonMulti-pattern.
ThemostnotablealgorithmsincludeAho-Corasick(shortasAC)[12]andCommentz-Walter(shortasCW)[11]algorithms.
Astringisdefinedasapattern.
TheadvantageofMulti-patternmatchingalgorithmisthatalltheoccurrencesofanygivenstringscanbefoundonlyinoneprocessofscanningtext.
Thiskindofalgorithmshastwosteps.
Firstly,foragivensetofstrings,afinitestateautomaton(orwecallitpatterntree)isconstructed.
Andthen,thetextsteamisscannedfromendtoendwiththispatterntree.
Actually,patternmatchingisaprocessofstatetransition.
Eachstateisrepresentedbyanumber.
"0"representsstartstate.
Thereisanotherspecialstate,outputstate.
Whenanoutputstateisreceived,thecorrespondingstringisemitted.
WedenoteasetofstringsbyS,andintendtodetectalltheoccurrencesofanystringsinSinatextstreamT.
Patternmatchingisthatgivenacurrentstateandthenextinputcharacter,themachinecheckstoseeifthecharactercausesafailuretransition.
Ifnot,thenitmakesatransitiontothecorrespondingstateaccordingtothecharacter.
Incaseofafailuretransitionthemachinemustreconsiderthecharactercausingthefailureforthenexttransitionandthesameprocessisrepeatedrecursivelyuntilthegivencharacterleadstoanon-failureoutputstate.
Mostmulti-patternalgorithmsusetheshiftmethodofSingle-patternmatchingalgorithmBM[13],forexample,CW.
Whenapatterncharacterisnotmatchedbythenextinputcharacter,severaltextcharacterswouldbeskippedaccordingtoashiftvalue.
Inthisway,thematchingprocessbecomesmoreefficient.
WemadecomparisontosomearticlecontentsinChineselanguageandinEnglishlanguagewithCWalgorithm.
WediscoveredthatthetraditionalkeywordsmatchingalgorithmisnotsuitableforChineselanguage.
Thereasonsasfollows:(1)Fromfig.
2(b),eachEnglishwordiscomposedof26lettersfrom'a'to'z'.
Andthelengthofeachwordisabout5letters.
Butfromfig.
2(a)ordinaryChinesecharactersaremorethan3,000atleasttomakethebasicunitsofaword,andeachwordismadeofabouttwocharacters.
TheresultofthisdifferenceisthatChinesepatterntree(fig.
2(a))isfarwiderthanEnglishpatterntree(fig.
2(b)).
MuchmatchingtimeisconsumedinmatchingthefirstcharacterinChinesepatterntree.
Fig.
2(a)Chinesepatterntree.
Whereweuses1torepresentstring1:空军(airman)intheleftbranch,s2:飞机(airplane),s3:军队(army),s4:战争(battle),s5:前线(battlefront),s6:战场(battleground).
States:2,4,6,7,9,11representtheiroutputstates.
Fig.
2(b)Englishpatterntree.
Whereweuses1torepresentstring1:airman,intheleftbranch,s2:airplane,s3:army,s4:battle,s5:battlefront,s6:battleground.
States:6,11,14,20,26,32representtheiroutputstates.
(2)SinceanEnglishword(about5letters)islongerthanaChineseword(about2characters).
ItresultsthatChinesepatterntree(fig.
2(a))hasfewerdepths,notasmuchdeepasEnglishpatterntree(fig.
2(b)).
Andsincetheshiftvalueisdeterminedbyminimumpatternlength,Chinesewordsaretooshortandthesystemcannotsaverunningtimeinshiftstage.
OursolutionisthatallChinesecharacterscontainedinstringpatternsareorganizedaccordingtoeachcomputeduniquevalue,readintoaHashtable.
AteachnodeofHashtable,childHashtableissetdynamicallythroughcomputingthelattercharacterofthisnodeinonestring.
ThiskindoffiniteautomatonisbasedonHash.
(Seefig.
3)Fig.
3Newstringpatterntreebasedonfastmulti-patternmatchingalgorithm.
Ifastringiscomposedofthreecharacters,depth3childhashtablecanbesetdynamically.
4.
2FilteringrulesbasedonpatternThenextproblemishowtomakefilteringrules.
WeusestatisticalmethodbasedonVSM.
Themodelmapseachdocumenttoasetofnormalizedtermsasavector,whichisexpressedas(T1,W1;T2,W2;…,Tn,Wn),whereTiisafeatureterm,WiistheweightforTi.
ThetraditionalTF-IDF[14]weights:∑=++*=niikiikiikNNttfNNttft122)05.
0(log)()05.
0log()()(ω(1)Thefilteringruleswemadeshouldhaverepresentationanddiscrimination.
Thatisfeaturetermsmustrepresentthecontentofthetargetandcandiscriminateaclassofdocumentsfromothers.
ThetraditionalTF-IDFonlycancomputetheweightofaterminoneclass,butcannotdiscriminatethedifferenceofitsweightinseveralclasses.
Therefore,themodifiedTF-IDFweightsaredefinedasfollows:)1()05.
0(log)()05.
0log()()(122DCDAniikiikiikDIDINNttfNNttft**++*=∑=ω(2)DIDA(DistributionInformationamongClasses)andDIDC(DistributionInformationinsideaClass)aretwoimpactfactors.
DIDArepresentsthedistributiondifferenceoffeaturetermsamongkindsofclasses.
DIDCrepresentsthedistributiondifferenceoffeaturetermsinthesameclass.
DIDAandDIDCaredefinedasfollows:)()1())()((12kmikkiDAttfmttfttfDI=∑=(3)∑==mikikttfmttf1)(1)(Wheretfi(tk)representsthefrequencyoffeaturetermtkinclassi,mrepresentsthenumberofclasses.
Whenafeaturetermtkonlyappearsinaclass,DIDA=1anditdiscriminatesclassstrongly.
Whenthefrequencyoftkineachclassisequal,DIDA=0anditcanhardlydiscriminatesclass.
)()1())()(('12'knjkkjDCttfnttfttfDI=∑=(4)∑==njkjkttfnttf1')(1)(Wheretfj(tk)representsthefrequencyoffeaturetermtkindocumentj,nrepresentsthenumberofdocumentsinoneclass.
Whenafeaturetermtkonlyappearsinadocumentofaclass,DIDA=1anditcanhardlydiscriminatesclass.
Thisdocumentislikelytobeanexceptionofthisclass.
Whenthefrequencyoftkineachdocumentofaclassisequal,DIDA=0,itdiscriminatesclassstrongly.
ThesystemcomputestheweightsoffeaturetermsaccordingtothemodifiedTF-IDFandselectsthosetermswiththeirweightsbiggerthanathreshold.
Andmaketheselectedtermsaspatternsinthepatterntree.
Thiskindofpatternalsocanbeaddedandmodifiedmanually.
Besides,wehavespecialtreatmentforsynonymandmeaninglesswords.
Theirdefinitionsareasfollows:Definition2,synonymmeansthemeaningofonewordissimilartoanother,oradialect,oranirregularwordtorepresentameaningfulword.
Wesetonedelegatewordforasynonymlist.
Thesystemevaluatestheweightofeachwordinthislistequaltothatofdelegate.
Forexample,adelegate"弟弟妹妹"(brothersandsisters)alwaysreplacesitsshorteningsymbolsandfabricatingterms"ddmm"inthelist.
Definition3,meaninglesswords,themeaningofthesewordshasnotenoughdiscriminationamongclasses.
Someofthemneedtobeidentifiedandpickedout.
Administratorcanaddormodifythemintoastopwordlist.
4.
3LinkAnalyzerSocialnetworkanalysistheoryhasmanymeaningfulparameters[7][8],whichcanexplainsomesocialproblemsincommunityenvironment.
WeusetheseparameterstodiscoverimportantinformationfromBBScharacterrelationdata.
TheparametersasDegree,Closeness,BetweennesscandisclosethestatusofdangerpersonsinBBS,andparametersasCharacteristicpathlength,Clustercoefficientdisclosethedensedegreeofcommunityandinformationspreadspeedwithincommunity.
Degreerepresentsthenumberofedgesconnectedwithnodev.
Indegreerepresentsthenumberofreplyfromothernodestonodev.
Outdegreerepresentsthenumberofreplyfromnodevtoothernode.
ThethreeparametersevaluatethedifferenceofcorestatusamongdangeraccountIDs.
Theyaredefined:maxdeg)deg()(vvd=(5)maxdeg)deg()(invinvdin=(6)maxdeg)deg()(outvoutvdout=(7)Itholds0≤d(v),din(v),dout(v)≤1,degmax,indegmaxandoutdegmaxarethemaximumvalueofDegree,IndegreeandOutdegreerespectively.
ClosenessweighstheadjacencydegreebetweennodevandothernodesuV.
Itisdefined:∈),(1)(uvdnvclVu∈Σ=(8)Wherenrepresentsthenumberofnodes,d(v,u)representstheshortestpathlengthfromnodevtonodeuV.
Itholds0≤∈cl(v)≤1.
Betweennessrepresentsthedependingdegreeonnodevfromnodeu∈VtoothernodeszV.
Itis∈defined:∑≠≠≠≠∈=zvuvzuzunVzuzunvzunnnvbw,,0),(;,),();,()2)(1(1)((9)Wheren(u,z)isthenumberofgeodesicsfromutozandn(u,z;v)isthenumberofgeodesicsfromutozpassingthroughv.
Itholds0≤bw(v)≤1.
Characteristicpathlengthrepresentstheaverageshortestpathlengthofn(n-1)/2pairofnodes.
Itisdefined:2/)1(),(,=∑nnuvdLuv(10)ClustercoefficientistheaverageofallnodesCv.
Cvisdefined:2/)1()(ΓΕ=vvvvkkC(11)Where)deg(vkv=,)(vΓΕrepresentstheedgesthattheneighborsofnodevconnecteachother.
Wecanobtainthedynamiccharacteristicsofdangeroussocialnetwork,anddiscovernewbehaviourpatternsthroughobservingandcomparingthechangeofparametervaluesindifferenttime.
Weusetheequationsumexpressionasfollows:2112))()((tptppmiii∑==(12)Wheremrepresentsthenumberofparameters,t1andt2representtwodifferenttimes,pi(t)representsthevalueofparameteriattimet.
Ifthevalueofpisbiggerthanthreshold,thereisanotablepatternvariance.
Thesystemneedtomonitorandanalyzeagain.
5InitialTestingResultsThefollowfiguresandtablesaresometestresults.
Inthefigures,The33accountIDsarefilteredoutbecausethecontentoftheirarticlesismatchedbythefilteringrulesofmilitaryaffairsclass.
Theydiscussedaroundthistopic.
Weusespotinvestigatingmethodstotracksomevitallinkclues.
Thismethodcontainsthreestepsasfollows:StepOne:GeneralInvestigationWeconsiderallaccountIDsasawhole.
Infig.
4thereareseveralcliquesinthiscommunity.
Thecentralkeypersonsofcliquesareobvious.
ID1andID7havebiggernodesanddeepercolor.
AndthearticlesfromID18,ID19,ID20andID21cannotarouseotherpersons'interest.
WecanidentifyeachIDcharacter'sstatusthroughcomputingSNAparametervalues.
(Seetab.
1)Fig.
4Generalinvestigation.
Tab.
1TopthreeaccountIDswithmaximumparametervalues.
ThistablerepresentsthetopthreekeyaccountIDsaccordingtothemaximumparametervalues.
WefindID1andID7havehighercentralityandareconsideredasleaders.
StepTwo:PartitionInvestigationWeneedtopaymoreattentiontothetwoleadersID1andID7.
ThepartitiongroupwecaredalsoincludestheaccountIDswhichhaverelationtoeitherID1orID7.
(Seefig.
5)Fig.
5.
Partitioninvestigation.
Wecanfindanimportantrolethatmaybeignoredinstep1.
HeisID10.
HenotonlyrepliedID1,butalsorepliedID7.
AlthoughhehasnothighcentralityasID1andID7,hemaybetheinformationsource.
StepThree:IndividualInvestigationWeshouldemphasisoninvestigatingthekeypersonsandtheirrepliers.
Wecanfindmoreneighborhoodinformationandclues.
Fig.
6.
Individualinvestigation.
Infig.
6,nineaccountIDsrepliedID1exceptID4.
ID1repliedID4unexpectedly.
WesupposethatanothercliquewillcomeuparoundID4.
6ConclusionsandFutureWorkThispaperintroducestheBBScontentsecurityframeworkroughly.
ThedynamicmonitoringmodelusesacombinedapproachofTextFiltering,SocialNetworkAnalysis(SNA)andspotinvestigatingmethod.
Inthecontentfiltering,anovelfastmulti-patternmatchingalgorithmisproposedandmoreefficientforChineselanguageespecially.
Inordertoimprovetheeffectofcontentfiltering,wedesigntoaddasemanticfunctioninthecontentfiltermodulebasedonknowledgerules.
Besides,moreBBSdataminingworkneedtodowithSNAtheory.
References:[1]HeJing,LiuHai-yan,Real-timeContentFilteringBasedonVectorSpaceModel,ComputerEngineering,Vol.
30,No.
15,2004,8,pp.
26-27.
[2]JinYao-hong,DesignandImplementationofSemantic-basedTextFilteringSystem,ComputerEngineeringandApplication,No.
17,2003,pp.
22-25.
[3]SUGui-yang,LIJian-hua,MAYing-hua,etal,Improvingtheprecisionofthekeyword-matchingpornographictextfilteringmethodusingahybridmodel,JournalofZhejiangUniversitySCIENCE,Vol.
5,No.
9,2004,pp.
1106-1113.
[4]LiuChang-yu,TangChang-jie,YuZhong-hua,BayesDiscriminatorforBBSDocumentBasedonLatentSemanticAnalysis,ChineseJournalofComputers,Vol.
27,No.
4,2004,pp.
566-572.
[5]VilleH.
Tuulos,HenryTirri,Combiningtopicmodelsandsocialnetworksforchatdatamining,Proceedings-IEEE/WIC/ACMInternationalConferenceonWebIntelligence,WI2004,2004,pp.
206-213.
[6]KouZhong-bao,ZhangChang-shui,Replynetworksonabulletinboardsystem,PhysicalReviewE(Statistical,Nonlinear,andSoftMatterPhysics),Vol.
67,No.
3,March,2003,pp.
36117-1-6.
[7]PetterHolme,CharacteristicsofSmallWorldNetworks,http://www.
tp.
umu.
se/_kim/Network/holme1.
pdf,20th,April,2001.
[8]D.
J.
Watts,S.
H.
Strogatz,CollectiveDynamicsof`Small-World'Networks,Nature,1998,pp.
393-440.
[9]Commentz-WalterB,Astring-matchingalgorithmfastontheaverage,Proc6thInternationalColloquiumonAutomataLanguagesandProgramming,1979,pp.
118-132.
[10]AhoAV,CorasickMJ,Efficientstringmatching:anaidtobibliographicsearch,CommunicationsoftheACM,No.
18,1975,pp.
333-340.
[11]BoyerRS,MooreJS,Afaststring-searchingalgorithm,CommunicationsoftheACM,No.
20,1977,pp.
762-772.
[12]Salton,G.
(Ed.
),AutomaticTextProcessing.
AddisonWesley,Massachusetts,1989.

趣米云(18元/月)香港三网CN2云服器低至;1核1G/30G系统盘+20G数据盘/10M带宽

趣米云怎么样?趣米云是创建于2021年的国人IDC商家,虽然刚刚成立,但站长早期为3家IDC提供技术服务,已从业2年之久,目前主要从事出售香港vps、香港独立服务器、香港站群服务器等,目前在售VPS线路有三网CN2、CN2 GIA,该公司旗下产品均采用KVM虚拟化架构。由于内存资源大部分已售,而IP大量闲置,因此我们本月新增1c1g优惠套餐。点击进入:趣米云官方网站地址香港三网CN2云服务器机型活...

瓜云互联:全场9折优惠,香港CN2、洛杉矶GIA高防vps套餐,充值最高返300元

瓜云互联怎么样?瓜云互联之前商家使用的面板为WHMCS,目前商家已经正式更换到了魔方云的面板,瓜云互联商家主要提供中国香港和美国洛杉矶机房的套餐,香港采用CN2线路直连大陆,洛杉矶为高防vps套餐,三网回程CN2 GIA,提供超高的DDOS防御,瓜云互联商家承诺打死退款,目前商家提供了一个全场9折和充值的促销,有需要的朋友可以看看。点击进入:瓜云互联官方网站瓜云互联促销优惠:9折优惠码:联系在线客...

AlphaVPS(€3.99/月)VPS年付15欧,AMD EYPC+NVMe系列起

AlphaVPS是一家保加利亚本土主机商(DA International Group Ltd),提供VPS主机及独立服务器租用等,数据中心包括美国(洛杉矶/纽约)、德国、英国和保加利亚等,公司办公地点跟他们提供的保加利亚数据中心在一栋楼内,自有硬件,提供IPv4+IPv6,支持PayPal或者信用卡等方式付款。商家提供的大硬盘VPS主机,提供128GB-2TB磁盘,最低年付15欧元起,也可以选择...

tianyaclub为你推荐
桌面背景图片经典桌面壁纸桌面背景图片大全谁能给我个 游戏桌面图标大全麒麟990和骁龙865哪个好骁龙八65和麒麟990谁强一点?华为p40和mate30哪个好mate30和mate30pro哪个比较好?音乐播放器哪个好音乐播放器哪个最好用手机音乐播放器哪个好手机哪个音乐播放器的音质更好?英语词典哪个好哪个英语词典好尼康和佳能单反哪个好佳能和尼康哪个好腾讯空间登录QQ空间登录辽宁联通网上营业厅的联通营业厅怎么走
最好的虚拟主机 如何注销域名备案 warez bluehost 双12活动 创宇云 美国php空间 dropbox网盘 100m免费空间 全站静态化 毫秒英文 seednet 免费防火墙 cdn加速是什么 重庆双线服务器托管 t云 万网空间购买 根服务器 下载速度测试 免费ftp 更多