Impact of word embedding models on text analytics in deep learning environment: a review

DS Asudani, NK Nagwani, P Singh - Artificial intelligence review, 2023 - Springer
The selection of word embedding and deep learning models for better outcomes is vital.
Word embeddings are an n-dimensional distributed representation of a text that attempts to …

Social media analytics on Russia–Ukraine cyber war with natural language processing: Perspectives and challenges

F Sufi - Information, 2023 - mdpi.com
Utilizing social media data is imperative in comprehending critical insights on the Russia–
Ukraine cyber conflict due to their unparalleled capacity to provide real-time information …

A deep bidirectional LSTM-GRU network model for automated ciphertext classification

E Ahmadzadeh, H Kim, O Jeong, N Kim, I Moon - IEEE access, 2022 - ieeexplore.ieee.org
Long Short-Term Memory (LSTM) and Gated Recurrent Units (GRU) are a class of Recurrent
Neural Networks (RNN) suitable for sequential data processing. Bidirectional LSTM …

A new social media-driven cyber threat intelligence

F Sufi - Electronics, 2023 - mdpi.com
Cyber threats are projected to cause USD 10.5 trillion in damage to the global economy in
2025. Comprehending the level of threat is core to adjusting cyber posture at the personal …

What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey

MR Rahman, RM Hezaveh, L Williams - ACM Computing Surveys, 2023 - dl.acm.org
Cybersecurity researchers have contributed to the automated extraction of CTI from textual
sources, such as threat reports and online articles describing cyberattack strategies …

Threat classification model for security information event management focusing on model efficiency

J Kim, HY Kwon - Computers & Security, 2022 - Elsevier
As various types of network threats have increased recently, manual threat response by
security analysts has become a limitation. To compensate for this, the importance of security …

Design of a novel information system for semi-automated management of cybersecurity in industrial control systems

K Ameri, M Hempel, H Sharif, J Lopez Jr… - ACM Transactions on …, 2023 - dl.acm.org
There is an urgent need in many critical infrastructure sectors, including the energy sector,
for attaining detailed insights into cybersecurity features and compliance with cybersecurity …

A New Social Media Analytics Method for Identifying Factors Contributing to COVID-19 Discussion Topics

F Sufi - Information, 2023 - mdpi.com
Since the onset of the COVID-19 crisis, scholarly investigations and policy formulation have
harnessed the potent capabilities of artificial intelligence (AI)-driven social media analytics …

Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

DR Arikkat, A Di Sorbo, CA Visaggio, M Conti - arXiv preprint arXiv …, 2023 - arxiv.org
Time-relevant and accurate threat information from public domains are essential for cyber
security. In a constantly evolving threat landscape, such information assists security …

Text classification using deep learning techniques: a bibliometric analysis and future research directions

G Sarin, P Kumar, M Mukund - Benchmarking: An International …, 2023 - emerald.com
Purpose Text classification is a widely accepted and adopted technique in organizations to
mine and analyze unstructured and semi-structured data. With advancement of …