[PDF][PDF] 基于机器学习的数据库技术综述

李国良, 周煊赫, 孙佶, 余翔, 袁海涛, 刘佳斌, 韩越 - 计算机学报, 2020 - cjc.ict.ac.cn
摘要大数据时代下, 面对不断膨胀的数据信息, 复杂多样的应用场景, 异构的硬件架构和参差不齐
的用户使用水平, 传统数据库技术很难适应这些新的场景和变化. 机器学习技术因其较强的学习 …

A machine learning approach for the NLP-based analysis of cyber threats and vulnerabilities of the healthcare ecosystem

S Silvestri, S Islam, S Papastergiou, C Tzagkarakis… - Sensors, 2023 - mdpi.com
Digitization in healthcare systems, with the wid adoption of Electronic Health Records,
connected medical devices, software and systems providing efficient healthcare service …

Bibliometric analysis of cybercrime and cybersecurity risks literature

H Nobanee, A Alodat, R Bajodah, M Al-Ali… - Journal of Financial …, 2023 - emerald.com
This study reveals various findings, including the most influential authors and the top
countries, journals, papers, funding institutions and affiliations publishing research on …

A new text classification model based on contrastive word embedding for detecting cybersecurity intelligence in twitter

HS Shin, HY Kwon, SJ Ryu - Electronics, 2020 - mdpi.com
Detecting cybersecurity intelligence (CSI) on social media such as Twitter is crucial because
it allows security experts to respond cyber threats in advance. In this paper, we devise a new …

Cvss-bert: Explainable natural language processing to determine the severity of a computer security vulnerability from its description

MR Shahid, H Debar - 2021 20th IEEE International …, 2021 - ieeexplore.ieee.org
When a new computer security vulnerability is publicly disclosed, only a textual description
of it is available. Cybersecurity experts later provide an analysis of the severity of the …

Cyber threat assessment and management for securing healthcare ecosystems using natural language processing

S Silvestri, S Islam, D Amelin, G Weiler… - International Journal of …, 2024 - Springer
The healthcare sectors have constantly faced significant challenge due to the rapid rise of
cyber threats. These threats can pose any potential risk within the system context and disrupt …

[PDF][PDF] VEST: A System for Vulnerability Exploit Scoring & Timing.

H Chen, J Liu, R Liu, N Park, VS Subrahmanian - IJCAI, 2019 - ijcai.org
Knowing if/when a cyber-vulnerability will be exploited and how severe the vulnerability is
can help enterprise security officers (ESOs) come up with appropriate patching schedules …

Towards end-to-end cyberthreat detection from Twitter using multi-task learning

N Dionísio, F Alves, PM Ferreira… - 2020 international joint …, 2020 - ieeexplore.ieee.org
Continuously striving for cyberthreat awareness is an essential task to secure an IT
infrastructure. Analysts must guarantee access to information on the most up-to-date …

[HTML][HTML] Cyberattack detection model using community detection and text analysis on social media

JH Park, HY Kwon - ICT Express, 2022 - Elsevier
Online social media such as Twitter has been used as an important source for predicting,
detecting, or analyzing critical social phenomena such as elections, disease outbreaks, and …

Challenges of protecting confidentiality in social media data and their ethical import

A Rossi, MP Arenas, E Kocyigit… - 2022 IEEE European …, 2022 - ieeexplore.ieee.org
This article discusses the challenges of pseudonymizing unstructured, noisy social media
data for cybersecurity research purposes and presents an open-source package developed …