A survey of the applications of text mining in financial domain

BS Kumar, V Ravi - Knowledge-Based Systems, 2016 - Elsevier
Text mining has found a variety of applications in diverse domains. Of late, prolific work is
reported in using text mining techniques to solve problems in financial domain. The …

HIDS: A host based intrusion detection system for cloud computing environment

P Deshpande, SC Sharma, SK Peddoju… - International Journal of …, 2018 - Springer
The paper reports a host based intrusion detection model for Cloud computing environment
along with its implementation and analysis. This model alerts the Cloud user against the …

An anomaly detection system based on variable N-gram features and one-class SVM

W Khreich, B Khosravifar, A Hamou-Lhadj… - Information and Software …, 2017 - Elsevier
Context: Run-time detection of system anomalies at the host level remains a challenging
task. Existing techniques suffer from high rates of false alarms, hindering large-scale …

CLAPP: A self constructing feature clustering approach for anomaly detection

RK Gunupudi, M Nimmala, N Gugulothu… - Future Generation …, 2017 - Elsevier
The term internet of things is a buzz word these days and as per Google survey conducted
recently, it has even dominated the buzz word big data predominantly. However, IoT area is …

[PDF][PDF] Computer worms: Architectures, evasion strategies, and detection mechanisms

C Smith, A Matrawy, S Chow, B Abdelaziz - Journal of Information …, 2009 - Citeseer
This paper surveys the Internet worms-related literature and how stealthy worm behaviour
can be discovered. Discussion is provided on the anatomy of worms, specifically covering …

Evaluation of artificial intelligent techniques to secure information in enterprises

A Rehman, T Saba - Artificial Intelligence Review, 2014 - Springer
Abstract Information security paradigm is under a constant threat in enterprises particularly.
The extension of World Wide Web and rapid expansion in size and types of documents …

Intrusion detection using text processing techniques with a kernel based similarity measure

A Sharma, AK Pujari, KK Paliwal - computers & security, 2007 - Elsevier
This paper focuses on intrusion detection based on system call sequences using text
processing techniques. It introduces kernel based similarity measure for the detection of host …

[HTML][HTML] Role-based lateral movement detection with unsupervised learning

BA Powell - Intelligent Systems with Applications, 2022 - Elsevier
Adversarial lateral movement via compromised accounts remains difficult to discover via
traditional rule-based defenses because it generally lacks explicit indicators of compromise …

Forensic analysis

O Mandrychenko, D Hart, JR Graves… - US Patent 11,032,301, 2021 - Google Patents
A forensic analysis method performed in respect of an endpoint device connected to a
computer network. The forensic analysis method comprises collecting file system call data …

Digital forensics

WJ Buchanan, JR Graves, N Bose - US Patent 8,887,274, 2014 - Google Patents
New digital forensic techniques and systems are disclosed. System call information is
collected from a device under test (DUT) and converted to a sequence format. Thereafter …