Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








227 Hits in 5.6 sec

Multi-Model Security and Social Media Analytics of the Digital Twin

Jim Scheibmeir, Yashwant Malaiya
2020 Advances in Science, Technology and Engineering Systems  
The study also indicates that cybersecurity tweets are consistently more negative in many areas of sentiment when compared to tweets about the internet of things.  ...  A multi-model scheme is presented to help digital twins towards the task of securing the physical system.  ...  Mention and Sentiment Analysis Studies show digital twins being utilized across industries; mention analysis from social media provides an additional perspective.  ... 
doi:10.25046/aj050639 fatcat:kmsmhveifbhi5eiyjair7bni7u

Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization

Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Karina Toscano-Medina, Victor Martinez-Hernandez, Hector Perez-Meana, Jesus Olivares-Mercado, Victor Sanchez
2018 Sensors  
Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine  ...  Learning techniques to interpret sentimental tendencies related to users opinions and make predictions about real events.  ...  testing set to perform this case study.  ... 
doi:10.3390/s18051380 pmid:29710833 pmcid:PMC5982517 fatcat:6xbkbtj4ebgu5opuanoqts7er4

Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation

Romilla Syed, Gurpreet Dhillon
2015 International Conference on Information Systems  
Using social media analytical techniques, this study examines Twitter postings to identify (1) ISR dimensions attributed as being responsible for data breaches and (2) social media sentiments in the aftermath  ...  The attributions and sentiments vary for the five ISR dimensions. Moreover, tweets that attribute data breach responsibility carry more negative sentiments.  ...  the exploratory analysis of Twitter postings, this study identifies five major dimensions of Information Security Reputation (ISR).  ... 
dblp:conf/icis/SyedD15 fatcat:w3c5pljgtvg4bg7a2guy37cx3e

Social media analytics of the Internet of Things

Jim A. Scheibmeir, Yashwant K. Malaiya
2021 Discover Internet of Things  
This research illuminates the public view of the Internet of Things through a content-based and network analysis of contemporary conversations occurring on the Twitter platform.  ...  Internet of Things solutions require careful management of devices and the risk mitigation of potential vulnerabilities within cyber-physical systems.  ...  Authors' contributions JS conceived the study. JS and YM reviewed the literature. JS collected the data and performed the text analysis. YM supervised the project.  ... 
doi:10.1007/s43926-021-00016-5 fatcat:tjoh4emprzfo7hsi5kzs42fgfy

An Exploratory Study of Cognitive Sciences Applied to Cybersecurity

Roberto O. Andrade, Walter Fuertes, María Cazares, Iván Ortiz-Garcés, Gustavo Navas
2022 Electronics  
The model we propose tries to fill the gap in automatizing cognitive science without taking into account the users' learning processes.  ...  Cognitive security is the interception between cognitive science and artificial intelligence techniques used to protect institutions against cyberattacks.  ...  machine learning and deep learning for identifying malicious URLs or sentiment analysis in social media: • Deep learning for word embedding; • Natural language processing and sentiment analysis on online  ... 
doi:10.3390/electronics11111692 fatcat:w64k5p6rc5at5ak6d4xfpuol5m

Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions

A. Mourad, A. Srour, H. Harmanani, C. Jenainati, M. Arafeh
2020 IEEE Transactions on Network and Service Management  
This article presents a large-scale study based on data mined from Twitter.  ...  Further data analysis revealed the importance of using social networks in a global pandemic crisis by relying on credible users with variety of occupations, content developers and influencers in specific  ...  The system systematically fetched approximately a million tweets from Twitter along with their corresponding users' profiles.  ... 
doi:10.1109/tnsm.2020.3031034 fatcat:o46ozi2rpnaidcp7t5a6kh76ma

Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions [article]

Azzam Mourad, Ali Srour, Haidar Harmanani, Cathia Jenainatiy, Mohamad Arafeh
2020 arXiv   pre-print
This paper presents a large-scale study based on data mined from Twitter.  ...  Further data analysis revealed the importance of using social networks in a global pandemic crisis by relying on credible users with variety of occupations, content developers and influencers in specific  ...  [42] focused on the content in different languages such case Arabic in order to produce a framework that is able to distinguish fake news by allotting a score for each content through sentiment analysis  ... 
arXiv:2005.08820v1 fatcat:vzwmd5mwzjendeaq3vfol6yxw4

Analysis of Insider Threats in the Healthcare Industry: A Text Mining Approach

In Lee
2022 Information  
Hence, this study develops a novel approach to the analysis of descriptive data breach information with the use of text mining and visualization.  ...  While there have been studies on trends of data breach incidents, there is a lack of research on the analysis of descriptive contents posted on the data breach reporting website of the U.S.  ...  Long Short-Term Memory (LSTM) and various classification techniques such as random forest, support vector machine, and logistic regression have been used to analyze the sentiment using a Twitter dataset  ... 
doi:10.3390/info13090404 fatcat:2i4slrvtqnelvlm7puziyjkmfe

Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity

Sherali Zeadally, Erwin Adi, Zubair Baig, Imran Khan
2020 IEEE Access  
INDEX TERMS Artificial intelligence, cybersecurity, cyberattacks, machine learning.  ...  Traditional cybersecurity solutions are becoming inadequate at detecting and mitigating emerging cyberattacks.  ...  SVMs can detect satirical sentiment in sentences that are potentially misleading news [113] , whereas with Naïve Bayes, it is possible to classify topics on Twitter to detect spam or phishing [117] .  ... 
doi:10.1109/access.2020.2968045 fatcat:tb6xkdqqhfcahb5soip66x5qce

Open source intelligence (OSINT) in a colombian context and sentiment analysis

Martin Jose Hernandez Mediná, Cristian Camilo Pinzón Hernández, Daniel Orlando Díaz López, Juan Carlos Garcia Ruiz, Ricardo Andrés Pinto Rico
2018 Revista vínculos  
Sentiment analysis can be extremely useful to understand the motivation that an adversary can have and, in this way, define proper cyber defense strategies.  ...  Additionally, this paper shows the implementation of three machine learning models used to perform sentiment analysis over the information obtained from an adversary.  ...  This paper uses predictive models to make sentiment analysis of information published by an adversary in a social network (Twitter) around a specific topic.  ... 
doi:10.14483/2322939x.13504 fatcat:uigrqgbquvdbfcoowk5q7wius4

Proceedings of the 11th International Workshop "Data analysis methods for software systems"

Jolita Bernatavičienė
2019 Vilnius University Proceedings  
DAMSS-2019 is the 11th international workshop on data analysis methods for software systems, organized in Druskininkai, Lithuania, at the end of the year. The same place and the same time every year.  ...  Finally, our system was used by psychologists in the clinical experiment and the case study for treatment of anxiety disorders.  ...  vitkute-adzgauskiene@vdu.lt While Sentiment Analysis is the task of extraction of subjective information from review texts, Aspect Based Sentiment Analysis (ABSA) is the task of extracting aspect terms  ... 
doi:10.15388/proceedings.2019.8 fatcat:hb3t35tmpnhlbkzbstyvxfrgyu

Cybercitizen's Experience on Cyber Attacks and Threats from Online Platforms Amidst Pandemic and Community Lockdown

Earl Jones G. Muico, Marjo Neil R. Villasin, Kate Casia, Kimberly B. Macunlay
2023 Journal of Legal Subjects  
This study sought to uncover the experience cybercitizen's who experienced cyberattacks amidst pandemic and community lockdown.  ...  The study is qualitative by nature with 7 identified participants. The results show various means of cyberbullying experienced by the participants.  ...  Similarly, participants from other studies about cyberbullying also shared a similar sentiment [17] .  ... 
doi:10.55529/jls.33.1.8 fatcat:6gys2pi66ne73ld4kraeapsige

Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases [chapter]

Rajesh Singh, Anita Gehlot, Dharam Buddhi
2022 Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases  
A comparative study of different machine learning classifiers for chronic disease prediction viz Heart Disease & Diabetes Disease is done in this paper.  ...  The Solar-Stirling engine systems can be the better option for off-grid power generation.  ...  Acknowledgement The authors of this manuscript thanks Uttaranchal University for encouragement and motivation in using advance technology in Horticulture. 7. many research studies are being done to improve  ... 
doi:10.13052/rp-9788770227667 fatcat:da47mjbbyzfwnbpde7rgbrlppe

Malicious Use of Artificial Intelligence in Sub-Saharan Africa: Challenges for Pan-African Cybersecurity

Konstantin A. Pantserev
2022 Vestnik RUDN International Relations  
At present, all leading nations are placing greater emphasis on the development of hybrid intelligent systems capable of solving extremely complicated tasks.  ...  The present study examines existing practices and risks of malicious use of artificial intelligence (MUAI) in Sub-Saharan African countries.  ...  Two main methods are used in this paper: case studies of the level of development in advanced technologies in different Sub-Saharan African countries and critical discourse analysis of different national  ... 
doi:10.22363/2313-0660-2022-22-2-288-302 fatcat:jtsco5nc2bhqrohglslchst6xa

Attribution Challenges in the Era of Cyber Warfare: Unraveling the Identity of Cyber-Attackers

Rafeak M Salem Abu Alead, ALI AMHMED AB ALTALIBE
2023 مجلة المعهد العالي للدراسات النوعية  
Based on the use of Twitter data spanning October 13, 2022 to April 6, 2023, with 37,386 tweets from 30,706 users in 54 languages, the study provides the first detailed multilingual analysis of the Russia-Ukraine  ...  Using advanced technologies such as language detection, translation, sentiment analysis, TF-IDF, LDA, Porter Stemming, n-grams, and others, the study provides automated cyber intelligence for Russia and  ... 
doi:10.21608/hiss.2023.337323 fatcat:rrefpkux6jgtzcesihwrffurua
« Previous Showing results 1 — 15 out of 227 results