[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
Using bilstm networks for context-aware deep sensitivity labelling on conversational data
A Pogiatzis, G Samakovitis - Applied Sciences, 2020 - mdpi.com
Information privacy is a critical design feature for any exchange system, with privacy-
preserving applications requiring, most of the time, the identification and labelling of …
preserving applications requiring, most of the time, the identification and labelling of …
Sensitive information detection: Recursive neural networks for encoding context
J Neerbek - arxiv preprint arxiv:2008.10863, 2020 - arxiv.org
The amount of data for processing and categorization grows at an ever increasing rate. At
the same time the demand for collaboration and transparency in organizations, government …
the same time the demand for collaboration and transparency in organizations, government …
Transformers for end-to-end infosec tasks: A feasibility study
Training a machine learning (ML) model from raw information security (InfoSec) data
involves utilizing distinct data types and input formats that require unique considerations …
involves utilizing distinct data types and input formats that require unique considerations …
Automated us diplomatic cables security classification: Topic model pruning vs. classification based on clusters
The US Government has been the target for cyberattacks from all over the world. Just
recently, former President Obama accused the Russian government of the leaking emails to …
recently, former President Obama accused the Russian government of the leaking emails to …
Automated big security text pruning and classification
Many security related big data problems, including document, traffic, and system log
analysis require analysis of unstructured text. Consider the task of analyzing company …
analysis require analysis of unstructured text. Consider the task of analyzing company …
Designing sensitive personal information detection and classification model for amharic text
Sensitive information is a classified type of content that should not be disclosed to the public
and that can harm the owner of the information if it is disclosed. To protect disclose of …
and that can harm the owner of the information if it is disclosed. To protect disclose of …
Automatic security classification based on incremental learning and similarity comparison
Y Liang, Z Wen, Y Tao, GL Li… - 2019 IEEE 8th Joint …, 2019 - ieeexplore.ieee.org
Document security classification is the foundation of security management for the sensitive
and confidential information. Different with the general document classification, the security …
and confidential information. Different with the general document classification, the security …
Research on behavior-based data leakage incidents for the sustainable growth of an organization
J Kim, J Kim, H Chang - Sustainability, 2020 - mdpi.com
With the continuously increasing number of data leakage security incidents caused by
organization insiders, current security activities cannot predict a data leakage. Because such …
organization insiders, current security activities cannot predict a data leakage. Because such …
Training transformers for information security tasks: A case study on malicious url prediction
EM Rudd, A Abdallah - arxiv preprint arxiv:2011.03040, 2020 - arxiv.org
Machine Learning (ML) for information security (InfoSec) utilizes distinct data types and
formats which require different treatments during optimization/training on raw data. In this …
formats which require different treatments during optimization/training on raw data. In this …