标题
Text Mining in Cybersecurity
作者
关键词
-
出版物
ACM COMPUTING SURVEYS
Volume 54, Issue 7, Pages 1-36
出版商
Association for Computing Machinery (ACM)
发表日期
2021-07-19
DOI
10.1145/3462477
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- A New Proposal on the Advanced Persistent Threat: A Survey
- (2020) Santiago Quintero-Bonilla et al. Applied Sciences-Basel
- A review of topic modeling methods
- (2020) Ike Vayansky et al. INFORMATION SYSTEMS
- Deep Feature-Based Text Clustering and its Explanation
- (2020) Renchu Guan et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- A machine learning framework for investigating data breaches based on semantic analysis of adversary’s attack patterns in threat intelligence repositories
- (2019) Umara Noor et al. Future Generation Computer Systems-The International Journal of eScience
- A policy-based containerized filter for secure information sharing in organizational environments
- (2019) J.L.Gonzalez-Compean et al. Future Generation Computer Systems-The International Journal of eScience
- Cyber security meets artificial intelligence: a survey
- (2019) Jian-hua Li Frontiers of Information Technology & Electronic Engineering
- Text Mining for Big Data Analysis in Financial Sector: A Literature Review
- (2019) Mirjana Pejić Bach et al. Sustainability
- Analyse digital forensic evidences through a semantic-based methodology and NLP techniques
- (2019) F. Amato et al. Future Generation Computer Systems-The International Journal of eScience
- Attention-based convolutional approach for misinformation identification from massive and noisy microblog posts
- (2019) Feng Yu et al. COMPUTERS & SECURITY
- A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise
- (2019) Umara Noor et al. Future Generation Computer Systems-The International Journal of eScience
- A Deep Look into neural ranking models for information retrieval
- (2019) Jiafeng Guo et al. INFORMATION PROCESSING & MANAGEMENT
- A survey of the applications of text mining for agriculture
- (2019) Brett Drury et al. COMPUTERS AND ELECTRONICS IN AGRICULTURE
- Text mining in education
- (2019) Rafael Ferreira‐Mello et al. Wiley Interdisciplinary Reviews-Data Mining and Knowledge Discovery
- Improving the Reliability of Deep Neural Networks in NLP: A Review
- (2019) Basemah Alshemali et al. KNOWLEDGE-BASED SYSTEMS
- Systematically Understanding the Cyber Attack Business
- (2018) Keman Huang et al. ACM COMPUTING SURVEYS
- Machine learning and semantic analysis of in-game chat for cyberbullying
- (2018) Shane Murnion et al. COMPUTERS & SECURITY
- Visual Question Authentication Protocol (VQAP)
- (2018) Andeep S. Toor et al. COMPUTERS & SECURITY
- A survey on technical threat intelligence in the age of sophisticated cyber attacks
- (2018) Wiem Tounsi et al. COMPUTERS & SECURITY
- Automatic Extraction of Access Control Policies from Natural Language Documents
- (2018) Masoud Narouei et al. IEEE Transactions on Dependable and Secure Computing
- Fuzzy Bag-of-Words Model for Document Representation
- (2018) Rui Zhao et al. IEEE TRANSACTIONS ON FUZZY SYSTEMS
- What is wrong with topic modeling? And how to fix it using search-based software engineering
- (2018) Amritanshu Agrawal et al. INFORMATION AND SOFTWARE TECHNOLOGY
- Towards ontology-based multilingual URL filtering: a big data problem
- (2018) Mubashar Hussain et al. JOURNAL OF SUPERCOMPUTING
- A Data Analytics Approach to the Cybercrime Underground Economy
- (2018) Jungkook An et al. IEEE Access
- A Novel Mechanism for Fast Detection of Transformed Data Leakage
- (2018) Xiaohong Huang et al. IEEE Access
- Semantic text classification: A survey of past and recent advances
- (2018) Berna Altınel et al. INFORMATION PROCESSING & MANAGEMENT
- Deep neural networks for bot detection
- (2018) Sneha Kudugunta et al. INFORMATION SCIENCES
- A multi-target approach to estimate software vulnerability characteristics and severity scores
- (2018) Georgios Spanos et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Enterprise reputation threats on social media: A case of data breach framing
- (2018) Romilla Syed JOURNAL OF STRATEGIC INFORMATION SYSTEMS
- Localising social network users and profiling their movement
- (2018) Hector Pellet et al. COMPUTERS & SECURITY
- Code authorship identification using convolutional neural networks
- (2018) Mohammed Abuhamad et al. Future Generation Computer Systems-The International Journal of eScience
- Taking stock of organisations’ protection of privacy: categorising and assessing threats to personally identifiable information in the USA
- (2017) Clay Posey et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Self-Taught convolutional neural networks for short text clustering
- (2017) Jiaming Xu et al. NEURAL NETWORKS
- S-Detector: an enhanced security model for detecting Smishing attack for mobile computing
- (2017) Jae Woong Joo et al. TELECOMMUNICATION SYSTEMS
- It Doesn’t Have to Be Like This: Cybersecurity Vulnerability Trends
- (2017) Rick Kuhn et al. IT Professional
- Enterprise data breach: causes, challenges, prevention, and future directions
- (2017) Long Cheng et al. Wiley Interdisciplinary Reviews-Data Mining and Knowledge Discovery
- Approaches to Cross-Domain Sentiment Analysis: A Systematic Literature Review
- (2017) Tareq Al-Moslmi et al. IEEE Access
- Cyber-Physical Systems Security—A Survey
- (2017) Abdulmalik Humayed et al. IEEE Internet of Things Journal
- Recent automatic text summarization techniques: a survey
- (2016) Mahak Gambhir et al. ARTIFICIAL INTELLIGENCE REVIEW
- A systematic review of text stemming techniques
- (2016) Jasmeet Singh et al. ARTIFICIAL INTELLIGENCE REVIEW
- Data security rules/regulations based classification of file data using TsF-kNN algorithm
- (2016) Munwar Ali Zardari et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- The impact of information security events to the stock market: A systematic literature review
- (2016) Georgios Spanos et al. COMPUTERS & SECURITY
- A study on Web security incidents in China by analyzing vulnerability disclosure platforms
- (2016) Cheng Huang et al. COMPUTERS & SECURITY
- SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods
- (2016) Aviad Cohen et al. EXPERT SYSTEMS WITH APPLICATIONS
- New rule-based phishing detection method
- (2016) Mahmood Moghimi et al. EXPERT SYSTEMS WITH APPLICATIONS
- Spam filtering framework for multimodal mobile communication based on dendritic cell algorithm
- (2016) El-Sayed M. El-Alfy et al. Future Generation Computer Systems-The International Journal of eScience
- Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
- (2016) Tiantian Zhu et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities
- (2016) Victor Benjamin et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System
- (2016) Weifeng Li et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- A survey on data leakage prevention systems
- (2016) Sultan Alneyadi et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A survey of the applications of text mining in financial domain
- (2016) B. Shravan Kumar et al. KNOWLEDGE-BASED SYSTEMS
- Semantic expansion using word embedding clustering and convolutional neural network for improving short text classification
- (2016) Peng Wang et al. NEUROCOMPUTING
- BiSAL – A bilingual sentiment analysis lexicon to analyze Dark Web forums for cyber security
- (2015) Khalid Al-Rowaily et al. Digital Investigation
- Text mining applications in psychiatry: a systematic literature review
- (2015) Adeline Abbe et al. INTERNATIONAL JOURNAL OF METHODS IN PSYCHIATRIC RESEARCH
- A survey on text mining in social networks
- (2015) Rizwana Irfan et al. KNOWLEDGE ENGINEERING REVIEW
- An integrated framework for securing semi-structured health records
- (2015) Flora Amato et al. KNOWLEDGE-BASED SYSTEMS
- Applying text mining methods for data loss prevention
- (2015) I. V. Mashechkin et al. PROGRAMMING AND COMPUTER SOFTWARE
- Trends in steganography
- (2014) Elżbieta Zielińska et al. COMMUNICATIONS OF THE ACM
- Clustering digital forensic string search output
- (2014) Nicole L. Beebe et al. Digital Investigation
- Text mining for market prediction: A systematic review
- (2014) Arman Khadjeh Nassirtoussi et al. EXPERT SYSTEMS WITH APPLICATIONS
- A survey of emerging threats in cybersecurity
- (2014) Julian Jang-Jaccard et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- Practical Linguistic Steganography using Contextual Synonym Substitution and a Novel Vertex Coding Method
- (2013) Ching-Yun Chang et al. COMPUTATIONAL LINGUISTICS
- From information security to cyber security
- (2013) Rossouw von Solms et al. COMPUTERS & SECURITY
- The impact of preprocessing on text classification
- (2013) Alper Kursat Uysal et al. INFORMATION PROCESSING & MANAGEMENT
- CoBAn: A context based model for data leakage prevention
- (2013) Gilad Katz et al. INFORMATION SCIENCES
- Probabilistic topic models
- (2012) David M. Blei COMMUNICATIONS OF THE ACM
- Improved multilevel security with latent semantic indexing
- (2012) Dirk Thorleuchter et al. EXPERT SYSTEMS WITH APPLICATIONS
- Steganalysis against substitution-based linguistic steganography based on context clusters
- (2011) Zhili Chen et al. COMPUTERS & ELECTRICAL ENGINEERING
- Post-retrieval search hit clustering to improve information retrieval effectiveness: Two digital forensics case studies
- (2011) Nicole Lang Beebe et al. DECISION SUPPORT SYSTEMS
- Detection of substitution-based linguistic steganography by relative frequency analysis
- (2011) Zhili Chen et al. Digital Investigation
- An efficient phishing webpage detector
- (2011) Mingxing He et al. EXPERT SYSTEMS WITH APPLICATIONS
- Assessing the severity of phishing attacks: A hybrid data mining approach
- (2010) Xi Chen et al. DECISION SUPPORT SYSTEMS
- Selecting Attributes for Sentiment Classification Using Feature Relation Networks
- (2010) Ahmed Abbasi et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- Cybersecurity for Critical Infrastructures: Attack and Defense Modeling
- (2010) Chee-Wooi Ten et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS
- Learning from Imbalanced Data
- (2009) Haibo He et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- A systematic analysis of performance measures for classification tasks
- (2009) Marina Sokolova et al. INFORMATION PROCESSING & MANAGEMENT
- Natural language watermarking via morphosyntactic alterations
- (2008) Hasan Mesut Meral et al. COMPUTER SPEECH AND LANGUAGE
- Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem
- (2008) Carolyn Holton DECISION SUPPORT SYSTEMS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started