23,771 Hits in 3.5 sec

Automated Big Text Security Classification [article]

Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow
2016 arXiv   pre-print
In this paper, we introduce Automated Classification Enabled by Security Similarity (ACESS), a new and innovative detection model that penetrates the complexity of big text security classification/detection  ...  However, state-of-art DLP detection models are only able to detect very limited types of sensitive information, and research in the field has been hindered due to the lack of available sensitive texts.  ...  Unlike most prior research, which has treated automated text security detection as a binary classification problem, our approach more realistically performs classification across multiple security levels  ... 
arXiv:1610.06856v1 fatcat:c7pmbkxlzvaspdg5uwx5qzuq54

Table of Contents

2021 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C)  
Chinese Academy of Sciences, China; CASIA-Junsheng (Shenzhen) Intelligent & Big Data Sci-Tech Development Ltd., China), Jian Wang (Institute of Automation, Chinese Academy of Sciences, China), and Yun  ...  Automation, Chinese Academy of Sciences, China), Meng Li (Institute of Automation, Chinese Academy of Sciences, China), Xueyang Hu (University of Maryland, USA), Weixing Huang (Institute of Automation,  ... 
doi:10.1109/qrs-c55045.2021.00004 fatcat:ken6km6h5fecrfzrms2odlpaze

Guest Editorial: Automated Big Data Analysis for Social Multimedia Network Environments

Changhoon Lee
2016 Multimedia tools and applications  
Another interesting example is to know in advance how big hit a new movie would be from user reviews or reactions on the movie trailer.  ...  Therefore, due to the abovementioned problems, the big data analysis using data mining and machine learning techniques should be considered in social network environment.  ...  They used Naïve Bayesian classification for survivors' or non-survivors' full-text comments as input data corresponding to the six principles (such as P1: Check the fire sources when an earthquake occurs  ... 
doi:10.1007/s11042-016-3838-8 fatcat:ior46rwjhbhb3evvu6pygemgje

Artificial Intelligence- (AI-) Enabled Internet of Things (IoT) for Secure Big Data Processing in Multihoming Networks

Geetanjali Rathee, Adel Khelifi, Razi Iqbal, Daniel G. Reina
2021 Wireless Communications and Mobile Computing  
Although multihoming security issues and their analysis have been well studied by various scientists and researchers; however, not much attention is paid towards big data security processing in multihoming  ...  especially using automated techniques and systems.  ...  However, not much attention is given to the automated multihoming schemes for managing, processing, and securing the big data information.  ... 
doi:10.1155/2021/5754322 fatcat:23dt6p6kmvfw7kwmgg2yeeqkgu

LiaaS: Lawful Interception as a Service

Mehrnoosh Monshizadeh, Vikramajeet Khatri, Mohammadali Varfan, Raimo Kantola
2018 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)  
Machine learning techniques are the key to success for big data analytics in forthcoming 5G and cloud networks.  ...  This paper proposes an intelligent, secure, fast and reliable platform called Lawful interception as a Service (LiaaS) to detect, analyze and intercept content from different media such as voice and video  ...  The anomaly detection module is used to secure LiaaS from cyberattacks such as Denial of Service (DoS). The Automated Information Extraction module extracts text and important information from call.  ... 
doi:10.23919/softcom.2018.8555753 dblp:conf/softcom/MonshizadehKVK18 fatcat:i7kodgkvzbgjfgwdo5fhdyq7sq

Table of Contents

2018 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)  
App For Women Using Augmented Reality 251 Handling Non-Relational Databases On Big Query With Scheduling Approach And Performance Analysis 252 Efficient Classification With An Improved Nearest  ...  Workflow Scheduling in Cloud Computing Environment with Classification Ordinal Optimization Using SVM 8 Deploying Scalable Services On Openstack Cloud using Docker Containers 9 Secure Dynamic Multiowner  ... 
doi:10.1109/iccubea.2018.8697655 fatcat:jvjgmcrh3fhxtkf4kyydawnkiq

An Integrated Methodology for Big Data Classification and Security for Improving Cloud Systems Data Mobility

Ismail Hababeh, Ammar Gharaibeh, Samer Nofal, Issa Khalil
2019 IEEE Access  
INDEX TERMS Big data classification, data security, metadata, risk impact level, HDFS.  ...  However, traditional security solutions are not capable of handling the security of big data mobility.  ...  , doc, xml, csv, xls, sql, log, db, or any type that could be converted to text, then the HDFS input formatter is used to convert the file contents into text. 5) The converted big data text file is split  ... 
doi:10.1109/access.2018.2890099 fatcat:7muq2sn4hzau3bnwjofyikenaa

IBM Cloud Solutions for Home Automation

Samah Attitalla, Viraj Chocksi, M. B.
2017 International Journal of Computer Applications  
Home automation is one realization of the Internet of things that allows us to control devices and systems at homes from different locations at any time where (Things) are connected to the internet in  ...  Automated Home, The same system can be enhanced by integrating more services from Bluemix according to the desire and need.  ...  The design in this paper focused on the usage of IoT platform, Text to Speech, Speech to Text and Visual Recognition services in the Home Environment to deliver some of the Basic requirements in a Cloud-Based  ... 
doi:10.5120/ijca2017913610 fatcat:u7hq3nm2mrdrrijtqxeiwba3ey

A Big Data Framework for Quality Assurance and Validation

2019 International journal of recent technology and engineering  
In proposed, to test the health care big data . In health care data contains text file, image file, audio file and video file.  ...  To test the big data document, by using two concepts such as big data preprocessing testing and post processing testing.  ...  Using machine learning, learning classifications of targets, and automating those classifications automatically. This is a learning problem overseeing.  ... 
doi:10.35940/ijrte.b1912.078219 fatcat:ljd54myamzbdfk7ekhjjqffcv4

Big Data and IoT in smart homes

Patricia Mezani, Nirida Pashaj, Romina Agaci
2021 International Conference on Recent Trends and Applications in Computer Science and Information Technology  
The term "big data" refers data that are big, fast or complex that it is difficult or impossible to process using traditional methods.  ...  Millions of devices are connected together, so internet of things will trigger a massive inflow of Big Data.  ...  The Big Data isn't 100% accurate. Security challenges of big data is also another challenge. The most typical feature of big data is its dramatic ability to grow.  ... 
dblp:conf/rtacsit/MezaniPA21 fatcat:624lq4yo2bfjfml33ans4kbviy

Editorial Notes Classification and Assessment of Large Amounts of Data

Stuart E. Madnick, Yang W. Lee
2011 Journal of Data and Information Quality  
For example, healthcare, financial industries, and national security areas have critical needs to analyze large amounts of data or what some might call, "big data".  ...  Using the experimental research method, the first article, "Combining Bayesian Text Classification and Shrinkage to Automate Healthcare Coding: A Data Quality Analysis" by Eitel J. M.  ...  This study is an important contribution to research and practice because assessment of the quality of text-based articles is inherently subjective and difficult to automate.  ... 
doi:10.1145/2063504.2063505 dblp:journals/jdiq/MadnickL11a fatcat:4znsdwp7zfbcfdh3yyx4oz27ym

ICCUBEA 2019 Table of Contents

2019 2019 5th International Conference On Computing, Communication, Control And Automation (ICCUBEA)  
proposing a feasible solution Track 6: Control and Automation Sr.  ...  Classification of Seizure disorder using EEG Signals 30 Sorghum Leaf Disease Detection and Classification Using Deep Learning 31 Evolutionary Computing Approaches for Solving Multi-Objective and  ... 
doi:10.1109/iccubea47591.2019.9128707 fatcat:3s3o5v2x3nepxeftk4jd64hjnq

Research on Network Security Situational Awareness Based on Crawler Algorithm

Xu Wu, Dezhi Wei, Bharati P. Vasgi, Ahmed Kareem Oleiwi, Sunil L. Bangare, Evans Asenso, Mukesh Soni
2022 Security and Communication Networks  
By designing a network security event analysis tool based on text processing, the data cleaning of network security time text information is completed, and a set of network security event processing solutions  ...  This study investigates the analysis and processing of network security events, a crucial parameter in the stage of security insight and perception, and builds and implements a text-based network security  ...  Situational awareness can represent the overall condition of cyber security in real time and predict network security growth. e application of big data technology opens up new avenues for big network security  ... 
doi:10.1155/2022/3639174 fatcat:5vi77cuonngxvi7f6v2ghagfda

Table of Contents

2020 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC)  
Detection from Multi-Oriented Text Images in Different Approaches Ranjitha.P, Rajashekar.K, Shamjith 240 43 A Comparative Study on Security Breach in Fog Computing and its Impact R.  ...  Rajeshkanna 183 33 Image Aesthetic Assessment using Deep Learning for Automated Classification of Images into Appealing or Not-Appealing Payal Bhandari, Mandovi Jaiswal, Vaishnavi Puranik, Shraddha  ... 
doi:10.1109/icesc48915.2020.9155566 fatcat:e5jetzey4bd4xfjf5ov42egtcy

Web News Mining using Back Propagation Neural Network and Clustering using K-Means Algorithm in Big Data

Sukhpal Kaur, Er. Mamoon Rashid
2016 Indian Journal of Science and Technology  
Text mining is the information which is used to store the data. Text mining is the combination of two words "text" and "mining".  ...  It means to get the large volume of text to find the most suitable information. It is related to unstructured data. Text is also called text data mining or knowledge discovery.  ...  In this paper, proposed a systematic framework of secure sharing of sensitive data on Big data platform, which ensures secure submission and storage of sensitive data based on the heterogeneous proxy re-encryption  ... 
doi:10.17485/ijst/2016/v9i41/95598 fatcat:qfmbwwpsjrhd3nhogsq2jobfza
« Previous Showing results 1 — 15 out of 23,771 results