A survey on cybersecurity knowledge graph construction
X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …
development of machine cognition technology, and the combination of KG and industry as …
Prediction and analysis of Indonesia Presidential election from Twitter using sentiment analysis
Big data encompasses social networking websites including Twitter as popular micro-
blogging social media platform for a political campaign. The explosive Twitter data as a …
blogging social media platform for a political campaign. The explosive Twitter data as a …
Cyberthreat detection from twitter using deep neural networks
To be prepared against cyberattacks, most organizations resort to security information and
event management systems to monitor their infrastructures. These systems depend on the …
event management systems to monitor their infrastructures. These systems depend on the …
Automated emerging cyber threat identification and profiling based on natural language processing
R Marinho, R Holanda - IEEE Access, 2023 - ieeexplore.ieee.org
The time window between the disclosure of a new cyber vulnerability and its use by
cybercriminals has been getting smaller and smaller over time. Recent episodes, such as …
cybercriminals has been getting smaller and smaller over time. Recent episodes, such as …
Big data quality metrics for sentiment analysis approaches
In a world increasingly connected, and in which information flows quickly and affects a very
large number of people, sentiment analysis has seen a spectacular development over the …
large number of people, sentiment analysis has seen a spectacular development over the …
Towards end-to-end cyberthreat detection from Twitter using multi-task learning
Continuously striving for cyberthreat awareness is an essential task to secure an IT
infrastructure. Analysts must guarantee access to information on the most up-to-date …
infrastructure. Analysts must guarantee access to information on the most up-to-date …
[HTML][HTML] Cyberattack detection model using community detection and text analysis on social media
Online social media such as Twitter has been used as an important source for predicting,
detecting, or analyzing critical social phenomena such as elections, disease outbreaks, and …
detecting, or analyzing critical social phenomena such as elections, disease outbreaks, and …
Estimation of voting behavior in election using support vector machine, extreme learning machine and deep learning
In this study, the extreme learning machine, support vector machine, and deep learning
models were used to predict the effect on the voting behavior of election music's used in the …
models were used to predict the effect on the voting behavior of election music's used in the …
Revisión bibliográfica del pronóstico electoral a través del big data.
P Cabrera-Tenecela - South American Research Journal, 2021 - sa-rj.net
Son escasos los estudios que ofrecen una panorámica sobre el nivel de predictibilidad del
big data en las ciencias políticas. El presente estudio realiza una descripción del origen de …
big data en las ciencias políticas. El presente estudio realiza una descripción del origen de …
Twitter sentiment data analysis of user behavior on cryptocurrencies: Bitcoin and Ethereum
Social networks such as Twitter contain billions of data of users, and in every second, a
large number of tweets trade through Twitter. Sentiment analysis is the way toward deciding …
large number of tweets trade through Twitter. Sentiment analysis is the way toward deciding …