Command-line commands form a special kind of seminatural language. Analyzing their structure and classifying them is a useful approach in the field of cyber security to detect anomalous commands used by malicious actors. Without any contextual knowledge, commands' analysis is a difficult task as similar-looking commands might be performing different tasks, and commands with different aliases might be performing the same tasks. To understand command-line commands' structure and their syntactic and semantic meanings, we created a rule-based system based on expert opinions. Using this system, we classified command-line commands into similar and not-similar classes. This rule-based system transformed command-line commands' data into a binary cl...
The CSIAC-DoDIN (V1.0) dataset collects cybersecurity-related policies and issuances developed by th...
Automated log level recommendation is a growing area of research in the field of logging. Logs are e...
Development of information technologies is growing steadily. With the latest software technologies d...
An enormous amount of knowledge is needed to infer the meaning of unrestricted natural language. The...
Natural language processing is a field that studies automatic computational processing of human lang...
The field of service automation is progressing rapidly, and increasingly complex tasks are being aut...
Within a situation where Semi-Supervised Learning (SSL) is available to exploit unlabeled data, this...
Abstract: Problem statement: Overgeneration-and-ranking architecture works well in written language ...
Voice command smart home systems have become a target for the industry to provide more natural human...
Transforming natural language requirements into entities involves a thorough study of natural langua...
In military command and control, success relies on being able to perform key functions such as commu...
Since the advent of computers, scientists have tried to use the human languages for communication wi...
Named Entity Recognition (NER) aims to extract and to classify rigid designators in text such as pro...
Humans routinely learn new concepts using natural language communications,even in scenarios with lim...
When people read a text, they rely on a priori knowledge of language, common sense knowledge and kno...
The CSIAC-DoDIN (V1.0) dataset collects cybersecurity-related policies and issuances developed by th...
Automated log level recommendation is a growing area of research in the field of logging. Logs are e...
Development of information technologies is growing steadily. With the latest software technologies d...
An enormous amount of knowledge is needed to infer the meaning of unrestricted natural language. The...
Natural language processing is a field that studies automatic computational processing of human lang...
The field of service automation is progressing rapidly, and increasingly complex tasks are being aut...
Within a situation where Semi-Supervised Learning (SSL) is available to exploit unlabeled data, this...
Abstract: Problem statement: Overgeneration-and-ranking architecture works well in written language ...
Voice command smart home systems have become a target for the industry to provide more natural human...
Transforming natural language requirements into entities involves a thorough study of natural langua...
In military command and control, success relies on being able to perform key functions such as commu...
Since the advent of computers, scientists have tried to use the human languages for communication wi...
Named Entity Recognition (NER) aims to extract and to classify rigid designators in text such as pro...
Humans routinely learn new concepts using natural language communications,even in scenarios with lim...
When people read a text, they rely on a priori knowledge of language, common sense knowledge and kno...
The CSIAC-DoDIN (V1.0) dataset collects cybersecurity-related policies and issuances developed by th...
Automated log level recommendation is a growing area of research in the field of logging. Logs are e...
Development of information technologies is growing steadily. With the latest software technologies d...