Predicting cybersecurity incidents using machine learning algorithms: A case study of Korean SMEs
The increasing amount and complexity of cyber security attacks in recent years have made
text analysis and data-mining based techniques an important factor in detecting security …
text analysis and data-mining based techniques an important factor in detecting security …
Big text advantages and challenges: classification perspective
M Sokolova - International Journal of Data Science and Analytics, 2018 - Springer
Big Text, ie, large repositories of textual data, is a part of Big Data. In total, 80–85% of Big
Text comes in unstructured form, with significant contribution from social media. In this …
Text comes in unstructured form, with significant contribution from social media. In this …
Cyber security incidents analysis and classification in a case study of Korean enterprises
The increasing amount and complexity of Cyber security attacks in recent years have made
text analysis and data mining techniques an important factor in discovering features of such …
text analysis and data mining techniques an important factor in discovering features of such …
PHDD: corpus of physical health data disclosure on Twitter during COVID-19 pandemic
Health-related information is considered as 'highly sensitive'by the European General Data
Protection Regulations (GDPR) and determining whether a text document contains health …
Protection Regulations (GDPR) and determining whether a text document contains health …
Anonymous prediction of mental illness in social media
The early detection of many forms of mental illnesses that people are struggling with (eg
Psychosis) can result in better chances for successful treatment. Unfortunately, symptoms of …
Psychosis) can result in better chances for successful treatment. Unfortunately, symptoms of …
[PDF][PDF] How joe and jane tweet about their health: mining for personal health information on Twitter
With 19%–28% of Internet users participating in online health discussions, it became
imperative to be able to detect and analyze posted personal health information (PHI). In this …
imperative to be able to detect and analyze posted personal health information (PHI). In this …
That's how I feel: A Study of User's Security Mental Model
Human behavior relates to many security breaches and plays a significant part in many
security situations. It reduces the efficacy of the security models developed to ensure data …
security situations. It reduces the efficacy of the security models developed to ensure data …