Abstract—Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources significantly before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant entities in text sources. The main contribution of this paper is an enhancement of the traditional bootstrapping method for entity extraction by employing a time-memory trade-off that simultaneously circumvents a costly corpus search while strengthening pattern nomination, which should increase accuracy. An implementation in the cyber...
In recent years, there has been an immense research interest in applying Machine Learning for defend...
This book is a practical handbook of research on dealing with mathematical methods in crime preventi...
Doctor of PhilosophyDepartment of Computer ScienceWilliam H HsuThis research develops learning repre...
Cyber Security has been a big concern especially in past one decade where it is witnessed that targe...
The use of more sophisticated tools and methods from cyber criminals has urged the cyber security co...
Timely analysis of cyber-security information necessitates automated information extraction from uns...
In this research, we use user defined labels from three internet text sources (Reddit, StackExchange...
Pervasive growth and usage of the Internet and mobile applications have expanded cyberspace. The cyb...
Global malware campaigns and large-scale data breaches show how everyday life can be impacted when t...
Cyber Security threats and attacks are becoming more common and sophisticated over the years. In or...
this article we present a semi-supervised active learning algorithm for pattern discovery in informa...
We present CASIE, a system that extracts information about cybersecurity events from text and popula...
The growing use of cyber-services automatically impart great importance to cybersecurity. The Intern...
Many cyber security experts, organizations, and cyber criminals are active users on online social ne...
Abstract—Cyber security is striving to find new forms of protection against hacker attacks. An emerg...
In recent years, there has been an immense research interest in applying Machine Learning for defend...
This book is a practical handbook of research on dealing with mathematical methods in crime preventi...
Doctor of PhilosophyDepartment of Computer ScienceWilliam H HsuThis research develops learning repre...
Cyber Security has been a big concern especially in past one decade where it is witnessed that targe...
The use of more sophisticated tools and methods from cyber criminals has urged the cyber security co...
Timely analysis of cyber-security information necessitates automated information extraction from uns...
In this research, we use user defined labels from three internet text sources (Reddit, StackExchange...
Pervasive growth and usage of the Internet and mobile applications have expanded cyberspace. The cyb...
Global malware campaigns and large-scale data breaches show how everyday life can be impacted when t...
Cyber Security threats and attacks are becoming more common and sophisticated over the years. In or...
this article we present a semi-supervised active learning algorithm for pattern discovery in informa...
We present CASIE, a system that extracts information about cybersecurity events from text and popula...
The growing use of cyber-services automatically impart great importance to cybersecurity. The Intern...
Many cyber security experts, organizations, and cyber criminals are active users on online social ne...
Abstract—Cyber security is striving to find new forms of protection against hacker attacks. An emerg...
In recent years, there has been an immense research interest in applying Machine Learning for defend...
This book is a practical handbook of research on dealing with mathematical methods in crime preventi...
Doctor of PhilosophyDepartment of Computer ScienceWilliam H HsuThis research develops learning repre...