Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
natural language text
biblio
Detecting Phishing Attacks Using Natural Language Processing and Machine Learning
Submitted by aekwall on Mon, 05/18/2020 - 9:53am
phishing attack detection
unsolicited e-mail
Uniform resource locators
text analysis
social engineering
Semantics
security threats
Scalability
Resiliency
pubcrawl
phishing emails
blacklisting
Phishing
natural language text
natural language processing
malicious intent detection
machine learning
learning (artificial intelligence)
inappropriate statements detection
Human behavior
Electronic mail
Computer crime
biblio
Towards a neural language model for signature extraction from forensic logs
Submitted by K_Hooper on Wed, 01/10/2018 - 10:14am
natural language text
use cases
text analysis
Software
signature extraction frameworks
Scalability
rule-based systems
rule-based approaches
Resiliency
pubcrawl
Predictive models
pattern clustering
nonmutable part identification
Neural networks
neural nets
neural language model
Clustering algorithms
natural language processing
log message
log line clustering
learning (artificial intelligence)
knowledge based systems
Human behavior
Heuristics
handcrafted algorithms
Forensics
forensic log analysis
error-prone
Digital Forensics
data analysis
complex relationship learning
biblio
Random Manhattan Indexing
Submitted by BrandonB on Tue, 05/05/2015 - 12:29pm
Mathematical model
Vectors
vector space model
text analysis
sparse Cauchy random projections
RMI
retrieval models
random projection
random Manhattan indexing
natural language text
Computational modeling
Manhattan distance
L1 normed VSM
indexing
Equations
dimensionality reduction technique
dimensionality reduction
data reduction
Context