Filters








13,328 Hits in 6.7 sec

Cross-Document Narrative Alignment of Environmental News: A Position Paper on the Challenge of Using Event Chains to Proxy Narrative Features

Ben Miller
2018 International Conference on Computational Linguistics  
Our own work in progress approaches this task using event segmentation, word embeddings, and variable length pattern matching in a corpus of 2,000 articles describing environmental events.  ...  Cross-document event chain co-referencing in corpora of news articles would achieve increased precision and generalizability from a method that consistently recognizes narrative, discursive, and phenomenological  ...  I would also like to thank the reviewers of this paper for their valuable feedback, in particular about morphological approaches to the narrative analysis of folktales, and the ongoing challenge of capturing  ... 
dblp:conf/coling/Miller18 fatcat:ylzkerbkrvghlkr37gpea5qun4

Enabling forensics by proposing heuristics to identify mandatory log events

Jason King, Rahul Pandita, Laurie Williams
2015 Proceedings of the 2015 Symposium and Bootcamp on the Science of Security - HotSoS '15  
We systematically extract each verb and object being acted upon from natural language software artifacts for three open-source software systems.  ...  We extract 3,513 verb-object pairs from 2,128 total sentences studied. Two raters classify each verb-object pair as either a mandatory log event or not.  ...  Natural language requirements specifications and user guides can be valuable sources for inferring mandatory log events.  ... 
doi:10.1145/2746194.2746200 dblp:conf/hotsos/KingPW15 fatcat:423srp5h7vaonjo45baac2qrmy

Detecting Cybersecurity Events from Noisy Short Text

Semih Yagcioglu, Mehmet Saygin Seyfioglu, Begum Citamak, Batuhan Bardak, Seren Guldamlasioglu, Azmi Yuksel, Emin Islam Tatli
2019 Proceedings of the 2019 Conference of the North  
We collected a new dataset of cyber security related tweets from Twitter and manually annotated a subset of 2K of them.  ...  The results suggest that our method works well for detecting cyber security events from noisy short text.  ...  Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the view of the sponsor.  ... 
doi:10.18653/v1/n19-1138 dblp:conf/naacl/YagciogluSCBGYT19 fatcat:la6ia47abrgjfpqt4cgkzrauhm

FCL: A Formal Language for Writing Contracts [chapter]

William M. Farmer, Qian Hu
2017 Advances in Intelligent Systems and Computing  
Based on the requirements, we clearly define the notion of contract and address what it means to fulfill or breach a contract. We present the formal syntax and semantics of fcl.  ...  Motivated by carefully selected examples of contracts, we derive a set of desirable requirements that a formal language of contracts should support.  ...  Using the code extraction functionality of the Coq system, they automatically extract an implementation of an embedded contract domain-specific language in Haskell.  ... 
doi:10.1007/978-3-319-56157-8_9 fatcat:udwyrsymcvdnvb46llms5xvqli

Detecting Cybersecurity Events from Noisy Short Text [article]

Semih Yagcioglu, Mehmet Saygin Seyfioglu, Begum Citamak, Batuhan Bardak, Seren Guldamlasioglu, Azmi Yuksel, Emin Islam Tatli
2019 arXiv   pre-print
We collected a new dataset of cyber security related tweets from Twitter and manually annotated a subset of 2K of them.  ...  The results suggest that our method works well for detecting cyber security events from noisy short text.  ...  Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the view of the sponsor.  ... 
arXiv:1904.05054v2 fatcat:apxwqdxs2re65f426erdzbsooq

From logs to stories: human-centred data mining for cyber threat intelligence

Neda AfzaliSeresht, Yuan Miao, Sandra Michalska, Qing Liu, Hua Wang
2020 IEEE Access  
In this paper, the model that generates the report in natural language by means of applying novel storytelling techniques from security logs is proposed.  ...  The report generated proves superior to existing approach in terms of comprehension (increased cognition) and completeness (enriched context).  ...  Her current research involves neural networks application to natural language processing tasks.  ... 
doi:10.1109/access.2020.2966760 fatcat:s4ul3sjw7ngtfcvu7piffxkf4e

Saving Patient Ryan Can Advanced Electronic Medical Records Make Patient Care Safer?

Muhammad Zia Hydari, Rahul Telang, William M Marella
2014 Social Science Research Network  
Since mid-2004, Pennsylvania state law has mandated that hospitals report a broad range of patient safety events to the PSA.  ...  We overcome this challenge by constructing a panel of Pennsylvania hospitals over 2005-2012 using data from several sources.  ...  We use an extract of the PSA data set, which includes all events reported from 1 January 2005 to 31 December 2012.  ... 
doi:10.2139/ssrn.2503702 fatcat:zneoy7jo6rco5gxh23rv4vqss4

On Controlled Natural Languages: Properties and Prospects [chapter]

Adam Wyner, Krasimir Angelov, Guntis Barzdins, Danica Damljanovic, Brian Davis, Norbert Fuchs, Stefan Hoefler, Ken Jones, Kaarel Kaljurand, Tobias Kuhn, Martin Luts, Jonathan Pool (+3 others)
2010 Lecture Notes in Computer Science  
This collaborative report highlights the properties and prospects of Controlled Natural Languages (CNLs).  ...  The report poses a range of questions concerning the goals of the CNL, the design, the linguistic aspects, the relationships and evaluation of CNLs, and the application tools.  ...  The report is also not a review of the extensive literature (see the links and references on Controlled Natural Languages). 2 By the same token, we have not strictly distinguished "natural" from "engineered  ... 
doi:10.1007/978-3-642-14418-9_17 fatcat:f4bne5h34rbtpbwq7fv2fx45ie

Privacy Requirements: Present & Future

Pauline Anthonysamy, Awais Rashid, Ruzanna Chitchyan
2017 2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering in Society Track (ICSE-SEIS)  
This poses a range of privacy requirements.  ...  We reflect on the limitations of existing approaches with regards to unbounded privacy requirements and highlight a set of key challenges for requirements engineering research with regards to managing  ...  models from natural language texts.  ... 
doi:10.1109/icse-seis.2017.3 dblp:conf/icse/AnthonysamyRC17 fatcat:slm2vm4b75c5jbnvbiz7wylc54

SEQUIN: a grammar inference framework for analyzing malicious system behavior

Robert Luh, Gregor Schramm, Markus Wagner, Helge Janicke, Sebastian Schrittwieser
2018 Journal in Computer Virology and Hacking Techniques  
Grammar inference paired with visual analytics (VA) techniques offers a powerful foundation for the automated extraction of behavioral patterns from sequential event traces.  ...  To facilitate the interpretation and analysis of APTs, we present SEQUIN, a grammar inference system based on the Sequitur compression algorithm that constructs a context-free grammar (CFG) from string-based  ...  In the IT sector, grammar inference is primarily used for pattern recognition, computational biology, natural language processing, language design programming, data mining, and machine learning.  ... 
doi:10.1007/s11416-018-0318-x fatcat:mx2ivpzxwnce5d3gp2myf6qrqe

A Logical Framework for Verifying Privacy Breaches of Social Networks [article]

Néstor Cataño
2018 arXiv   pre-print
Our approach is unique in its use of formal methods tools and techniques.  ...  These types of privacy breaches are often unintentional in social networks like Facebook, and hence, (more) in-place mechanisms are needed to make social network users aware of the consequences of changing  ...  We encode our logical framework for social networking in the input language of Yices and use Yices' solver [Dut14] to check for privacy breaches.  ... 
arXiv:1806.03519v1 fatcat:4wgpaowk6jch5cfc7mwchfj3xu

Reconciling multi-jurisdictional legal requirements: A case study in requirements water marking

David G. Gordon, Travis D. Breaux
2012 2012 20th IEEE International Requirements Engineering Conference (RE)  
We evaluate the framework in an empirical case study conducted over a subset of U.S. data breach notification laws that require companies to secure their data and notify consumers in the event of data  ...  To address this problem, we developed a framework called "requirements water marking" that business analysts can use to align and reconcile requirements from multiple jurisdictions (municipalities, provinces  ...  Department of Homeland Security (Grant Award #2006-CS-001-000001) and Hewlett-Packard Labs Innovation Research Program (Award #CW267287).  ... 
doi:10.1109/re.2012.6345843 dblp:conf/re/GordonB12 fatcat:nan3yw7ay5hjrhshc3f5eyhsmy

How Good Is a Security Policy against Real Breaches? A HIPAA Case Study

Ozgur Kafali, Jasmine Jones, Megan Petruso, Laurie Williams, Munindar P. Singh
2017 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)  
Our investigation of a subset of the breaches reported by the US Department of Health and Human Services (HHS) reveals the gaps between HIPAA and reported breaches, leading to a coverage of 65%.  ...  We use the US Health Insurance Portability and Accountability Act (HIPAA) as a case study.  ...  ACKNOWLEDGMENTS This research is supported by the US Department of Defense under the Science of Security Lablet grant.  ... 
doi:10.1109/icse.2017.55 dblp:conf/icse/KafaliJPWS17 fatcat:g7bzwgi6kzas3i32w25rfjreoy

An Ontology for Insider Threat Indicators: Development and Application

Daniel Costa, Matthew Collins, Samuel J. Perl, Michael Albrethsen, George Silowash, Derrick Spooner
2014 Semantic Technologies for Intelligence, Defense, and Security  
This ontology bridges the gap between natural language descriptions of malicious insiders, malicious insider activity, and machine-generated data that analysts and investigators use to detect behavioral  ...  Our ontology is intended to serve as a standardized expression method for potential indicators of malicious insider activity, as well as a formalization of much of our team's research on insider threat  ...  ACKNOWLEDGEMENT The authors gratefully acknowledge support for this work from the Defense Advanced Research Projects Agency (DARPA) and the Federal Bureau of Investigation.  ... 
dblp:conf/stids/CostaCPASS14 fatcat:xj33gmk5qndklmumfcjpzwenb4

Inferring Offensiveness In Images From Natural Language Supervision [article]

Patrick Schramowski, Kristian Kersting
2021 arXiv   pre-print
In particular, large image datasets automatically scraped from the web may contain derogatory terms as categories and offensive images, and may also underrepresent specific classes.  ...  Based on human-annotated examples and the implicit knowledge of a CLIP based model, we demonstrate that one can select relevant prompts for rating the offensiveness of an image.  ...  We make use of the multimodality by prompting the model with natural language to analyze if and to which extent it is able to infer the offensiveness in images. Offensive images.  ... 
arXiv:2110.04222v1 fatcat:dyc7qhyfc5e2nkllgezbg7ullq
« Previous Showing results 1 — 15 out of 13,328 results