Zobrazeno 1 - 10
of 60
pro vyhledávání: '"Jana Shakarian"'
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warf
Automated Corpus Annotation for Cybersecurity Named Entity Recognition with Small Keyword Dictionary
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783030821982
IntelliSys (3)
IntelliSys (3)
In order to assist security analysts in obtaining information pertaining to the cybersecurity tailored to the security domain are needed. Since labeled text data is scarce and expensive, Named Entity Recognition (NER) is used to detect the relevant d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::20d28500767305cb81a5d92015555a80
https://doi.org/10.1007/978-3-030-82199-9_11
https://doi.org/10.1007/978-3-030-82199-9_11
Autor:
Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian, Edward G. Amoroso
Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication of these threat actors can help reduce the risk of attacks. This book shifts attention from the defender environment to the attacker environment, offe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ab08170dfdb6cbbb0aada6da571df1d8
https://doi.org/10.1017/9781108869003
https://doi.org/10.1017/9781108869003
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030630911
Social network analysis is one of the important tasks for cybersecurity field to identify some potentially important members in the hackers’ forums and communities. To create the social network of the forums and communities, we need to understand t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c58e96179c3349bb0ebb1e40331f904b
https://doi.org/10.1007/978-3-030-63092-8_55
https://doi.org/10.1007/978-3-030-63092-8_55
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030551865
IntelliSys (2)
IntelliSys (2)
The automated and timely conversion or extraction of cybersecurity information from unstructured text from online sources is important and required for many applications. Named Entity Recognition (NER) is used to detect the relevant domain entities s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::83b40a9836df978e47f7aeaab8c642d3
https://doi.org/10.1007/978-3-030-55187-2_28
https://doi.org/10.1007/978-3-030-55187-2_28
Publikováno v:
Social Network Analysis and Mining. 9
With rise in security breaches over the past few years, there has been an increasing need to mine insights from social media platforms to raise alerts of possible attacks in an attempt to defend conflict during competition. In this study, we attempt