Zobrazeno 1 - 10
of 690
pro vyhledávání: '"R, Vinayakumar"'
In recent years, the amount of Cyber Security data generated in the form of unstructured texts, for example, social media resources, blogs, articles, and so on has exceptionally increased. Named Entity Recognition (NER) is an initial step towards con
Externí odkaz:
http://arxiv.org/abs/2004.00502
In recent days, the amount of Cyber Security text data shared via social media resources mainly Twitter has increased. An accurate analysis of this data can help to develop cyber threat situational awareness framework for a cyber threat. This work pr
Externí odkaz:
http://arxiv.org/abs/2004.00503
Security analysts and administrators face a lot of challenges to detect and prevent network intrusions in their organizations, and to prevent network breaches, detecting the breach on time is crucial. Challenges arise while detecting unforeseen attac
Externí odkaz:
http://arxiv.org/abs/1910.01114
Text is the major method that is used for communication now a days, each and every day lots of text are created. In this paper the text data is used for the classification of the emotions. Emotions are the way of expression of the persons feelings wh
Externí odkaz:
http://arxiv.org/abs/1901.03141
Recurrent neural network (RNN) is an effective neural network in solving very complex supervised and unsupervised tasks. There has been a significant improvement in RNN field such as natural language processing, speech processing, computer vision and
Externí odkaz:
http://arxiv.org/abs/1901.04281
Deep learning mechanisms are prevailing approaches in recent days for the various tasks in natural language processing, speech recognition, image processing and many others. To leverage this we use deep learning based mechanism specifically Bidirecti
Externí odkaz:
http://arxiv.org/abs/1901.00297
Deep learning is an advanced model of traditional machine learning. This has the capability to extract optimal feature representation from raw input samples. This has been applied towards various use cases in cyber security such as intrusion detectio
Externí odkaz:
http://arxiv.org/abs/1812.06292
Deep neural networks (DNNs) have witnessed as a powerful approach in this year by solving long-standing Artificial intelligence (AI) supervised and unsupervised tasks exists in natural language processing, speech processing, computer vision and other
Externí odkaz:
http://arxiv.org/abs/1812.03519
Advanced driver assistance systems are advancing at a rapid pace and all major companies started investing in developing the autonomous vehicles. But the security and reliability is still uncertain and debatable. Imagine that a vehicle is compromised
Externí odkaz:
http://arxiv.org/abs/1810.04144
Hackers and spammers are employing innovative and novel techniques to deceive novice and even knowledgeable internet users. Image spam is one of such technique where the spammer varies and changes some portion of the image such that it is indistingui
Externí odkaz:
http://arxiv.org/abs/1810.03977