Text mining in cybersecurity: A systematic literature review

L Ignaczak, G Goldschmidt, CAD Costa… - ACM Computing …, 2021 - dl.acm.org
The growth of data volume has changed cybersecurity activities, demanding a higher level
of automation. In this new cybersecurity landscape, text mining emerged as an alternative to …

Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm

M Ali, LT Jung, AH Abdel-Aty, MY Abubakar… - Expert Systems with …, 2020 - Elsevier
The k-NN algorithm is one of the most renowned ML algorithms widely used in the area of
data classification research. With the emergence of big data, the performance and the …

Cloud computing and data security threats taxonomy: A review

M Farsi, M Ali, RA Shah, AA Wagan… - Journal of Intelligent …, 2020 - content.iospress.com
Cloud computing is considered as a new paradigm shift in distributed computing. Due to its
increasing popularity, it has gotten increasing attention in the research community. In the last …

Multimedia image data analysis based on knn algorithm

R Li, S Li - Computational Intelligence and Neuroscience, 2022 - Wiley Online Library
In order to improve the authenticity of multispectral remote sensing image data analysis, the
KNN algorithm and hyperspectral remote sensing technology are used to organically …

A context-aware encryption protocol suite for edge computing-based IoT devices

Z Dar, A Ahmad, FA Khan, F Zeshan, R Iqbal… - The Journal of …, 2020 - Springer
Heterogeneous devices are connected with each other through wireless links within a cyber
physical system. These devices undergo resource constraints such as battery, bandwidth …

Reducing the required time and power for data encryption and decryption using K-NN machine learning

MU Bokhari, QM Shallal… - IETE Journal of Research, 2019 - Taylor & Francis
Cloud computing allows the users to store their data in its storage and use them whenever
they need. While the data of user is traveling outside its physical infrastructure through …

A comparative study on the application of text mining in cybersecurity

K Barik, S Misra, K Konar, M Kaushik… - Recent Advances in …, 2023 - ingentaconnect.com
Aims: This paper aims to conduct a Systematic Literature Review (SLR) of the relative
applications of text mining in cybersecurity. Objectives: The amount of data generated …

Intelligent deep learning‐based hierarchical clustering for unstructured text data

B Jyothi, S Lingamgunta, S Eluri - … and Computation: Practice …, 2022 - Wiley Online Library
Document clustering is a technique used to split the collection of textual content into clusters
or groups. In modern days, generally, the spectral clustering is utilized in machine learning …

A new text-based w-distance metric to find the perfect match between words

M Ali, LT Jung, O Hosam, AA Wagan… - Journal of Intelligent …, 2020 - content.iospress.com
The k-NN algorithm is an instance-based learning algorithm which is widely used in the data
mining applications. The core engine of the k-NN algorithm is the distance/similarity function …

Differentiated management strategies on cloud computing data security driven by data value

Z Wang, N Wang, X Su, S Ge - Information Security Journal: A …, 2016 - Taylor & Francis
Data security is a primary concern for the enterprise moving data to cloud. This study
attempts to match the data of different values with the different security management …