[PDF][PDF] Clustering Natural Language Test Case Instructions as Input for Deriving Automotive Testing DSLs.

K Juhnke, A Nikic, M Tichy - J. Object Technol., 2021 - jot.fm
System testing is an important quality assurance technique in the area of automotive
software development where predominantly natural language test cases are used for testing …

LENTA: Longitudinal exploration for network traffic analysis from passive data

A Morichetta, M Mellia - IEEE Transactions on Network and …, 2019 - ieeexplore.ieee.org
In this paper, we present longitudinal exploration for network traffic analysis (LENTA), a
system that supports the network analysts in the identification of traffic generated by services …

Lenta: Longitudinal exploration for network traffic analysis

A Morichetta, M Mellia - 2018 30th International Teletraffic …, 2018 - ieeexplore.ieee.org
In this work, we present LENTA (Longitudinal Exploration for Network Traffic Analysis), a
system that supports the network analysts to easily identify traffic generated by services and …

Achieving horizontal scalability in density-based clustering for urls

A Faroughi, R Javidan, M Mellia… - … Conference on Big …, 2018 - ieeexplore.ieee.org
Clustering has become an important means to analyze large datasets when labeled data is
not available. The volume of data and its variety however challenge classical clustering …

Clustering and evolutionary approach for longitudinal web traffic analysis

A Morichetta, M Mellia - Performance Evaluation, 2019 - Elsevier
In recent years, data-driven approaches have attracted the interest of the research
community. Considering network monitoring, unsupervised machine learning solutions such …

Automated malware analysis that automatically clusters sandbox reports of similar malware samples

A Parlak, E Lovat, T Mainka - US Patent 11,580,222, 2023 - Google Patents
G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, eg
of processors, firmware or operating systems during program execution, eg stack integrity; …

Gone Phishin'An Investigation of Node Classification in Graphical Models for Domain Abuse Detection

J Rosko, W Truvé - 2023 - odr.chalmers.se
In today's digital era, cyber attacks pose a constant threat as attackers attempt to access
proprietary data and disrupt operations on a daily basis. Phishing remains their number one …

Harvesting Bibliography Multi-thread, Safe and Ethical Web Crawling

HTY Achsan, WC Wibowo, WTH Putri… - 2018 International …, 2018 - ieeexplore.ieee.org
Web mining is an important techniques for it enables extraction of data and information from
the web for further needs. Although there are a lot of web databases that holds bibliography …

Identifying in-app user actions from mobile web logs

B Priyogi, M Sanderson, F Salim, J Chan… - Advances in Knowledge …, 2018 - Springer
We address the problem of identifying in-app user actions from Web access logs when the
content of those logs is both encrypted (through HTTPS) and also contains automated Web …

[PDF][PDF] Дослідження методів машинного навчання без вчителя для кластеризації текстових даних українською мовою

НК Півнь - 2024 - ir.nmu.org.ua
Об'єкт дослідження–текстові дані українською мовою, які потребують кластеризації для
подальшої організації та аналізу. Предмет дослідження–методи машинного навчання …