A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Automated Big Text Security Classification
[article]
2016
arXiv
pre-print
In this paper, we introduce Automated Classification Enabled by Security Similarity (ACESS), a new and innovative detection model that penetrates the complexity of big text security classification/detection ...
However, state-of-art DLP detection models are only able to detect very limited types of sensitive information, and research in the field has been hindered due to the lack of available sensitive texts. ...
Unlike most prior research, which has treated automated text security detection as a binary classification problem, our approach more realistically performs classification across multiple security levels ...
arXiv:1610.06856v1
fatcat:c7pmbkxlzvaspdg5uwx5qzuq54
Table of Contents
2021
2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C)
Chinese Academy of Sciences, China; CASIA-Junsheng (Shenzhen) Intelligent & Big Data Sci-Tech Development Ltd., China), Jian Wang (Institute of Automation, Chinese Academy of Sciences, China), and Yun ...
Automation, Chinese Academy of Sciences, China), Meng Li (Institute of Automation, Chinese Academy of Sciences, China), Xueyang Hu (University of Maryland, USA), Weixing Huang (Institute of Automation, ...
doi:10.1109/qrs-c55045.2021.00004
fatcat:ken6km6h5fecrfzrms2odlpaze
Guest Editorial: Automated Big Data Analysis for Social Multimedia Network Environments
2016
Multimedia tools and applications
Another interesting example is to know in advance how big hit a new movie would be from user reviews or reactions on the movie trailer. ...
Therefore, due to the abovementioned problems, the big data analysis using data mining and machine learning techniques should be considered in social network environment. ...
They used Naïve Bayesian classification for survivors' or non-survivors' full-text comments as input data corresponding to the six principles (such as P1: Check the fire sources when an earthquake occurs ...
doi:10.1007/s11042-016-3838-8
fatcat:ior46rwjhbhb3evvu6pygemgje
Artificial Intelligence- (AI-) Enabled Internet of Things (IoT) for Secure Big Data Processing in Multihoming Networks
2021
Wireless Communications and Mobile Computing
Although multihoming security issues and their analysis have been well studied by various scientists and researchers; however, not much attention is paid towards big data security processing in multihoming ...
especially using automated techniques and systems. ...
However, not much attention is given to the automated multihoming schemes for managing, processing, and securing the big data information. ...
doi:10.1155/2021/5754322
fatcat:23dt6p6kmvfw7kwmgg2yeeqkgu
LiaaS: Lawful Interception as a Service
2018
2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
Machine learning techniques are the key to success for big data analytics in forthcoming 5G and cloud networks. ...
This paper proposes an intelligent, secure, fast and reliable platform called Lawful interception as a Service (LiaaS) to detect, analyze and intercept content from different media such as voice and video ...
The anomaly detection module is used to secure LiaaS from cyberattacks such as Denial of Service (DoS). The Automated Information Extraction module extracts text and important information from call. ...
doi:10.23919/softcom.2018.8555753
dblp:conf/softcom/MonshizadehKVK18
fatcat:i7kodgkvzbgjfgwdo5fhdyq7sq
Table of Contents
2018
2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)
App For Women Using Augmented Reality
251
Handling Non-Relational Databases On Big Query With Scheduling Approach And Performance
Analysis
252
Efficient Classification With An Improved Nearest ...
Workflow Scheduling in Cloud Computing Environment with Classification Ordinal Optimization
Using SVM
8
Deploying Scalable Services On Openstack Cloud using Docker Containers
9
Secure Dynamic Multiowner ...
doi:10.1109/iccubea.2018.8697655
fatcat:jvjgmcrh3fhxtkf4kyydawnkiq
An Integrated Methodology for Big Data Classification and Security for Improving Cloud Systems Data Mobility
2019
IEEE Access
INDEX TERMS Big data classification, data security, metadata, risk impact level, HDFS. ...
However, traditional security solutions are not capable of handling the security of big data mobility. ...
, doc, xml, csv, xls, sql, log, db, or any type that could be converted to text, then the HDFS input formatter is used to convert the file contents into text. 5) The converted big data text file is split ...
doi:10.1109/access.2018.2890099
fatcat:7muq2sn4hzau3bnwjofyikenaa
IBM Cloud Solutions for Home Automation
2017
International Journal of Computer Applications
Home automation is one realization of the Internet of things that allows us to control devices and systems at homes from different locations at any time where (Things) are connected to the internet in ...
Automated Home, The same system can be enhanced by integrating more services from Bluemix according to the desire and need. ...
The design in this paper focused on the usage of IoT platform, Text to Speech, Speech to Text and Visual Recognition services in the Home Environment to deliver some of the Basic requirements in a Cloud-Based ...
doi:10.5120/ijca2017913610
fatcat:u7hq3nm2mrdrrijtqxeiwba3ey
A Big Data Framework for Quality Assurance and Validation
2019
International journal of recent technology and engineering
In proposed, to test the health care big data . In health care data contains text file, image file, audio file and video file. ...
To test the big data document, by using two concepts such as big data preprocessing testing and post processing testing. ...
Using machine learning, learning classifications of targets, and automating those classifications automatically. This is a learning problem overseeing. ...
doi:10.35940/ijrte.b1912.078219
fatcat:ljd54myamzbdfk7ekhjjqffcv4
Big Data and IoT in smart homes
2021
International Conference on Recent Trends and Applications in Computer Science and Information Technology
The term "big data" refers data that are big, fast or complex that it is difficult or impossible to process using traditional methods. ...
Millions of devices are connected together, so internet of things will trigger a massive inflow of Big Data. ...
The Big Data isn't 100% accurate. Security challenges of big data is also another challenge. The most typical feature of big data is its dramatic ability to grow. ...
dblp:conf/rtacsit/MezaniPA21
fatcat:624lq4yo2bfjfml33ans4kbviy
Editorial Notes Classification and Assessment of Large Amounts of Data
2011
Journal of Data and Information Quality
For example, healthcare, financial industries, and national security areas have critical needs to analyze large amounts of data or what some might call, "big data". ...
Using the experimental research method, the first article, "Combining Bayesian Text Classification and Shrinkage to Automate Healthcare Coding: A Data Quality Analysis" by Eitel J. M. ...
This study is an important contribution to research and practice because assessment of the quality of text-based articles is inherently subjective and difficult to automate. ...
doi:10.1145/2063504.2063505
dblp:journals/jdiq/MadnickL11a
fatcat:4znsdwp7zfbcfdh3yyx4oz27ym
ICCUBEA 2019 Table of Contents
2019
2019 5th International Conference On Computing, Communication, Control And Automation (ICCUBEA)
proposing a feasible solution
Track 6: Control and Automation
Sr. ...
Classification of Seizure disorder using EEG Signals
30
Sorghum Leaf Disease Detection and Classification Using Deep Learning
31
Evolutionary Computing Approaches for Solving Multi-Objective and ...
doi:10.1109/iccubea47591.2019.9128707
fatcat:3s3o5v2x3nepxeftk4jd64hjnq
Research on Network Security Situational Awareness Based on Crawler Algorithm
2022
Security and Communication Networks
By designing a network security event analysis tool based on text processing, the data cleaning of network security time text information is completed, and a set of network security event processing solutions ...
This study investigates the analysis and processing of network security events, a crucial parameter in the stage of security insight and perception, and builds and implements a text-based network security ...
Situational awareness can represent the overall condition of cyber security in real time and predict network security growth. e application of big data technology opens up new avenues for big network security ...
doi:10.1155/2022/3639174
fatcat:5vi77cuonngxvi7f6v2ghagfda
Table of Contents
2020
2020 International Conference on Electronics and Sustainable Communication Systems (ICESC)
Detection from Multi-Oriented Text Images in Different Approaches
Ranjitha.P, Rajashekar.K, Shamjith
240
43
A Comparative Study on Security Breach in Fog Computing and its Impact
R. ...
Rajeshkanna
183
33
Image Aesthetic Assessment using Deep Learning for Automated Classification of Images
into Appealing or Not-Appealing
Payal Bhandari, Mandovi Jaiswal, Vaishnavi Puranik, Shraddha ...
doi:10.1109/icesc48915.2020.9155566
fatcat:e5jetzey4bd4xfjf5ov42egtcy
Web News Mining using Back Propagation Neural Network and Clustering using K-Means Algorithm in Big Data
2016
Indian Journal of Science and Technology
Text mining is the information which is used to store the data. Text mining is the combination of two words "text" and "mining". ...
It means to get the large volume of text to find the most suitable information. It is related to unstructured data. Text is also called text data mining or knowledge discovery. ...
In this paper, proposed a systematic framework of secure sharing of sensitive data on Big data platform, which ensures secure submission and storage of sensitive data based on the heterogeneous proxy re-encryption ...
doi:10.17485/ijst/2016/v9i41/95598
fatcat:qfmbwwpsjrhd3nhogsq2jobfza
« Previous
Showing results 1 — 15 out of 23,771 results