Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
NLP
biblio
Research on Intelligent Security Protection of Privacy Data in Government Cyberspace
Submitted by grigby1 on Mon, 12/28/2020 - 12:38pm
protection efficiency
intelligent discovery
intelligent security protection
learning (artificial intelligence)
machine learning
Metrics
middleware
NLP
open systems
privacy protection
improved masking process
pubcrawl
resilience
Resiliency
Scalability
security
sensitive data discovery
static masking
structured privacy data
unstructured privacy data
data source
automatic execution
automatic recommendation
big data privacy
categorization and classification
Classification algorithms
data analysis
data masking algorithm
Data models
data privacy
agent-based intelligent masking middleware
dynamic masking
Government
government cyberspace
government data masking process
government data processing
government privacy data
government unstructured text
Human behavior
biblio
NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports
Submitted by grigby1 on Fri, 08/28/2020 - 12:23pm
Metrics
Training
threat intelligence reports
threat intelligence
threat actors
text representation algorithm
text analysis
Text
Task Analysis
security literature
security analytics
security
pubcrawl
NLP
natural language processing
Information Reuse and Security
malware
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Human behavior
feature extraction
composability
classification
attribution
attack attribution
Resiliency
Compositionality
biblio
Text Sectioning Based on Stylometric Distances
Submitted by grigby1 on Mon, 01/27/2020 - 12:29pm
automatic text sectioning
Human behavior
Human Factors
Metrics
NLP
pubcrawl
style analysis
stylometric distance
stylometry
biblio
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence
Submitted by aekwall on Mon, 03/04/2019 - 10:48am
Entropy
Automated Response Actions
Trojan horses
timely defense decision making
Text Mining
Stanford typed dependency parser
rapid growth
publicly available CTI sources
NLP techniques
NLP
Mutual information
Malware behavior analysis
low-level cyber threat actions
information theory
extract threat actions
security of data
enabling timely response
cybersecurity texts
cyber threat intelligence sharing
cyber threat intelligence
Cyber Attacks
advance threat notice
ActionMiner
natural language processing
Data mining
Decision Making
Cybersecurity
composability
pubcrawl
Resiliency
biblio
Source Code Authorship Approaches Natural Language Processing
Submitted by grigby1 on Fri, 02/22/2019 - 4:02pm
authorship attribution
deep learning
Human behavior
machine learning
Metrics
natural language processing
NLP
pubcrawl
source code
stylometry
biblio
Automated Threat Report Classification over Multi-Source Data
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
multisource data
Training
threat report documents
Threat report
Standards organizations
security of data
security
Scalability
Resiliency
pubcrawl
pattern classification
Organizations
NLP
natural language processing techniques
natural language processing
advanced persistent threats
Metrics
machine learning model
learning (artificial intelligence)
Human behavior
feature extraction
enterprise system defenders
document handling
defense systems
Data mining
command and control systems
collaboration
business data processing
bias correction
automated threat report classification
biblio
Detecting phishing attacks from URL by using NLP techniques
Submitted by K_Hooper on Wed, 01/10/2018 - 11:15am
natural language processing
URL
unsolicited e-mail
Uniform resource locators
security of data
Scalability
Resiliency
random forest algorithm
pubcrawl
Postal services
phishing attack analysis report
phishing attack
NLP
natural language processing techniques
Computer crime
Nanoelectromechanical systems
Markov processes
machine learning-based system
machine learning
learning (artificial intelligence)
Law
Internet users
internet
Human behavior
cyber security
cyber attack threats
Cyber Attack Detection
biblio
Enhanced word embedding with multiple prototypes
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
NLP
word unit
word similarity evaluation task
word representation
word embeddings learning
word embedding
vector space
similar meanings
similar context
Scalability
Resiliency
pubcrawl
Prototypes
Artificial Neural Networks
natural language processing
multiple prototypes
MCBOW
language models
Human behavior
enhanced word embedding
distributed word representation
dense real-valued vector space
Context modeling
Computational modeling
Biological system modeling
basic word repressentation methods
biblio
The Arabic Knowledge Graph: Opportunities and Challenges
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
natural language processing
Semantics
Semantic Web
Scalability
Resiliency
question answering (information retrieval)
query answering
pubcrawl
Opportunities
Ontologies
NLP
AKG
Metadata Discovery Problem
Linked Data
internet
graph theory
feature extraction
Encyclopedias
Electronic publishing
Compositionality
challenges
Arabic knowledge graph
biblio
A Digital Forensics Investigation Model for Social Networking Site
Submitted by grigby1 on Tue, 05/30/2017 - 12:37pm
collaboration
composability
Human behavior
IMs
information extraction
information forensics
Metrics
NLP
pubcrawl
Resiliency
Scalability
Social Networking Site
Suspicious Words
« first
‹ previous
1
2