72 Hits in 6.5 sec

PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts [article]

Nikki McNeil, Robert A. Bridges, Michael D. Iannacone, Bogdan Czejdo, Nicolas Perez, John R. Goodall
2013 arXiv   pre-print
In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant entities in text sources.  ...  The main contribution of this paper is an enhancement of the traditional bootstrapping method for entity extraction by employing a time-memory trade-off that simultaneously circumvents a costly corpus  ...  INTRODUCTION This paper introduces PACE, a novel bootstrapping algorithm for entity extraction, and an application to cyber-security where domain concepts involving vulnerabilities and exploits are learned  ... 
arXiv:1308.4648v3 fatcat:lgpdn5biyjea5oyv55qlje6l5i

Convergence Platforms: Foundational Science and Technology Tools [chapter]

Mark Lundstrom, H.-S. Philip Wong
2013 Science Policy Reports  
Semiconductor microelectronics was one of the great technologies of the 20 th century.  ...  of NBIC technologies (Figure 1.12) .  ...  Software / cyber-infrastructure / cyber security institutes as enablers for convergence 4.  ... 
doi:10.1007/978-3-319-02204-8_1 fatcat:t55qy6axezfaxnjmfbhurqfuda


Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, Robin Doss, Mike J. Ryan
2021 IEEE Access  
However, the multitude of benefits that are derived from the IoT paradigm are short-lived due to the exponential rise in the associated security and privacy threats.  ...  However, for various reasons, those proposed solutions are not well suited for modern IoT-enabled critical infrastructure.  ...  while accurately calculating the bill.  ... 
doi:10.1109/access.2021.3124309 fatcat:vejtyjyrwffeffi7ob2o2svyja

Toxicity Analysis and Cry Gene Profiling of Bacillus Thuringiensis Isolated from Western Ghats of Tamil Nadu State, India

A. Ramalakshmi, P. Annakodi, V. Udayasurian, V. Balasubramani
2018 Proceedings of the Indian National Science Academy  
In fact, there were methods of storing like Quipu of Incas and tools for calculating like Chinese counting rods.  ...  There are several different ways of arriving at such a definition, which, however all lead to exactly the same concept.  ...  The ability to make such discoveries depends on time-critical processing of large volumes of data with HPC, and the ability to identify patterns in the data for scientists to exploit to make new discoveries  ... 
doi:10.16943/ptinsa/2018/49413 fatcat:2w6rohpbava5zh6m26tsiz7qky

Survey on Highly Imbalanced Multi-class Data

Mohd Hakim Abdul Hamid, Marina Yusoff, Azlinah Mohamed
2022 International Journal of Advanced Computer Science and Applications  
Finally, for highly imbalanced multi-class data, this paper presents a novel framework.  ...  This article aims to (1) understand the trend of highly imbalanced multi-class data through analysis of related literatures; (2) analyze the previous and current methods of handling highly imbalanced multi-class  ...  Mohd Hakim bin Abdul Hamid, a PhD candidate, would like to express his gratitude to the Information Security, Digital Forensic, and Computer Networking (INSFORNET) research group, Center for Advanced Computing  ... 
doi:10.14569/ijacsa.2022.0130627 fatcat:fzzmjmfvsfczhbgmgcg5rwg2ze

IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework

Charles Wheelus, Xingquan Zhu
2020 IoT  
for implementing secure IoT systems.  ...  The recent surge in Internet of Things (IoT) deployment has increased the pace of integration and extended the reach of the Internet from computers, tablets and phones to a myriad of devices in our physical  ...  Conflicts of Interest: The authors declare there are no conflicts of interest.  ... 
doi:10.3390/iot1020016 fatcat:6enkuqspqjc7hdj7yl6uuqte5u

A Taxonomy Study on Securing Blockchain-based Industrial Applications: An Overview, Application Perspectives, Requirements, Attacks, Countermeasures, and Open Issues [article]

Khizar Hameed, Mutaz Barika, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang
2021 arXiv   pre-print
Blockchain began its journey from the concept of cryptocurrency and is now part of a range of core applications to achieve resilience and automation between various tasks.  ...  Although several approaches have been proposed to address the specific security and privacy needs of targeted applications with functional parameters, there is still a need for a research study on the  ...  that go beyond automation and to aid in real-time discovery.  ... 
arXiv:2105.11665v1 fatcat:bsm7w2shjneajp425oddszr6ju

Reliability Inversion: A Cautionary Tale

Behrooz Parhami
2020 Computer  
R eliability inversion is a new concept being introduced in this article for the first time.  ...  He is responsible for cyber risk management and ensuring the secure operations of Expel's services. He cofounded Ponte Technologies.  ...  Policing Privacy ■ Dynamic Cloud Certification ■ Security for High-Risk Users It's an industry best practice to ask your suppliers for their software's BOM in the SPDX format, which can be checked and  ... 
doi:10.1109/mc.2019.2958907 fatcat:xcaxq7gocbfy5iyv2ne7d6nwlu

IRRODL Volume 13, Number 5

Various Authors
2012 International Review of Research in Open and Distance Learning  
The method proposed in their article can help tutors reduce the time spent on building the ontology of fifty courses for a ii recommender system which makes suggestions on course selections for students  ...  To solve this problem, information retrieval technology is important for teachers to manage and analyze learning materials and for learners to learn efficiently and effectively.  ...  Acknowledgments We would like to thank three anonymous reviewers for their constructive comments and the editors for their time and valuable remarks.  ... 
doi:10.19173/irrodl.v13i5.1424 fatcat:lpe2ose6d5dlpea4xfhtxrbldi

5G PPP Architecture Working Group - View on 5G Architecture, Version 4.0

Anastasius Gavras, Ömer Bulakci, Marco Gramaglia, Marius Iordache, Mir Ghoraishi, Antonio Garcia, Tezcan Cogalan, Jesús Gutiérrez, Anna Tzanakaki, Dan Warren, Xi Li, Giada Landi (+4 others)
2021 Zenodo  
operation we are seeing these days; the second one (Phase II) which provided the first proof of concepts; and the third one (Phase III) that has targeted the first large scale platforms.  ...  This current version 4 of the white paper is hence focusing on the output of the Phase III projects, thus, discussing the latest findings in terms of the integration of large infrastructure and vertical  ...  In such configuration, there is an additional requirement for accurate time synchronisation between all analyser and measurement probe components for time stamping purpose.  ... 
doi:10.5281/zenodo.5155657 fatcat:xbjiccshe5cnvfurrh345dynue

A 20-Year Community Roadmap for Artificial Intelligence Research in the US [article]

Yolanda Gil, Bart Selman
2019 arXiv   pre-print
, and secure.  ...  These are the major recommendations of a recent community effort coordinated by the Computing Community Consortium and the Association for the Advancement of Artificial Intelligence to formulate a Roadmap  ...  Transform National Defense and Security Artificial Intelligence is already an essential part of cyber security, providing commercial and military cyber defenders with comprehensive security monitoring,  ... 
arXiv:1908.02624v1 fatcat:jza6i2tzufgeracsou77qukbu4

The Fourth Paradigm – Data-Intensive Scientific Discovery [chapter]

Tony Hey
2012 Communications in Computer and Information Science  
And, of course, we thank Jim Gray, for inspiring us. ACKN OWLE DG M E NTS  ...  Acknowledgments My thanks to the participants at the April 24, 2009, Buckland-Lynch-Larsen "Friday Seminar" on information access at the University of California, Berkeley, School of Information for a  ...  dissemination of accurate and timely medical knowledge and information.  ... 
doi:10.1007/978-3-642-33299-9_1 fatcat:etue636ubrandga5corvkx3d7u

2020 Index IEEE Transactions on Neural Networks and Learning Systems Vol. 31

2020 IEEE Transactions on Neural Networks and Learning Systems  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination.  ...  ., +, TNNLS May 2020 1667-1680 Compact and Computationally Efficient Representation of Deep Neural Networks.  ... 
doi:10.1109/tnnls.2020.3045307 fatcat:34qoykdtarewhdscxqj5jvovqy

Stock Market Analysis with Text Data: A Review [article]

Kamaladdin Fataliyev, Aneesh Chivukula, Mukesh Prasad, Wei Liu
2021 arXiv   pre-print
for future research.  ...  The aim of this study is to survey the main stock market analysis models, text representation techniques for financial market prediction, shortcomings of existing techniques, and propose promising directions  ...  Shravankumar and Ravi [131] focus on text mining works for financial industry and cover FOREX rate prediction, customer relationship management and cyber security alongside stock market prediction.  ... 
arXiv:2106.12985v2 fatcat:prfo5c6bmfd3piwpl5yevfycje

Mutual Shaping between Technologies and Law: Memories of Norwegian e-Health Infrastructures

Anna Zaytseva, Margunn Aanestad, Sundeep Sahay, Sisse Finken
2016 Zenodo  
The corresponding approach extensively exploits the properties of the narrative form of qualitative data for its parallel tagging, time-relevant visualization, meaning-based clustering and relationship  ...  Technologies and law are conceptualized symmetrically, though processed asymmetrically due to their natural differences and experience of time flow.  ...  model for HealthBook rather than its own security solution because of specificity, the uniqueness and simplicity of HealthBook in its concept.  ... 
doi:10.5281/zenodo.3474437 fatcat:p4nygtz7kfhqpa26lnyd7gmtua
« Previous Showing results 1 — 15 out of 72 results