A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Multi-Model Security and Social Media Analytics of the Digital Twin
2020
Advances in Science, Technology and Engineering Systems
The study also indicates that cybersecurity tweets are consistently more negative in many areas of sentiment when compared to tweets about the internet of things. ...
A multi-model scheme is presented to help digital twins towards the task of securing the physical system. ...
Mention and Sentiment Analysis Studies show digital twins being utilized across industries; mention analysis from social media provides an additional perspective. ...
doi:10.25046/aj050639
fatcat:kmsmhveifbhi5eiyjair7bni7u
Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization
2018
Sensors
Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine ...
Learning techniques to interpret sentimental tendencies related to users opinions and make predictions about real events. ...
testing set to perform this case study. ...
doi:10.3390/s18051380
pmid:29710833
pmcid:PMC5982517
fatcat:6xbkbtj4ebgu5opuanoqts7er4
Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation
2015
International Conference on Information Systems
Using social media analytical techniques, this study examines Twitter postings to identify (1) ISR dimensions attributed as being responsible for data breaches and (2) social media sentiments in the aftermath ...
The attributions and sentiments vary for the five ISR dimensions. Moreover, tweets that attribute data breach responsibility carry more negative sentiments. ...
the exploratory analysis of Twitter postings, this study identifies five major dimensions of Information Security Reputation (ISR). ...
dblp:conf/icis/SyedD15
fatcat:w3c5pljgtvg4bg7a2guy37cx3e
Social media analytics of the Internet of Things
2021
Discover Internet of Things
This research illuminates the public view of the Internet of Things through a content-based and network analysis of contemporary conversations occurring on the Twitter platform. ...
Internet of Things solutions require careful management of devices and the risk mitigation of potential vulnerabilities within cyber-physical systems. ...
Authors' contributions JS conceived the study. JS and YM reviewed the literature. JS collected the data and performed the text analysis. YM supervised the project. ...
doi:10.1007/s43926-021-00016-5
fatcat:tjoh4emprzfo7hsi5kzs42fgfy
An Exploratory Study of Cognitive Sciences Applied to Cybersecurity
2022
Electronics
The model we propose tries to fill the gap in automatizing cognitive science without taking into account the users' learning processes. ...
Cognitive security is the interception between cognitive science and artificial intelligence techniques used to protect institutions against cyberattacks. ...
machine learning and deep learning for identifying malicious URLs or sentiment analysis in social media:
• Deep learning for word embedding; • Natural language processing and sentiment analysis on online ...
doi:10.3390/electronics11111692
fatcat:w64k5p6rc5at5ak6d4xfpuol5m
Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions
2020
IEEE Transactions on Network and Service Management
This article presents a large-scale study based on data mined from Twitter. ...
Further data analysis revealed the importance of using social networks in a global pandemic crisis by relying on credible users with variety of occupations, content developers and influencers in specific ...
The system systematically fetched approximately a million tweets from Twitter along with their corresponding users' profiles. ...
doi:10.1109/tnsm.2020.3031034
fatcat:o46ozi2rpnaidcp7t5a6kh76ma
Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions
[article]
2020
arXiv
pre-print
This paper presents a large-scale study based on data mined from Twitter. ...
Further data analysis revealed the importance of using social networks in a global pandemic crisis by relying on credible users with variety of occupations, content developers and influencers in specific ...
[42] focused on the content in different languages such case Arabic in order to produce a framework that is able to distinguish fake news by allotting a score for each content through sentiment analysis ...
arXiv:2005.08820v1
fatcat:vzwmd5mwzjendeaq3vfol6yxw4
Analysis of Insider Threats in the Healthcare Industry: A Text Mining Approach
2022
Information
Hence, this study develops a novel approach to the analysis of descriptive data breach information with the use of text mining and visualization. ...
While there have been studies on trends of data breach incidents, there is a lack of research on the analysis of descriptive contents posted on the data breach reporting website of the U.S. ...
Long Short-Term Memory (LSTM) and various classification techniques such as random forest, support vector machine, and logistic regression have been used to analyze the sentiment using a Twitter dataset ...
doi:10.3390/info13090404
fatcat:2i4slrvtqnelvlm7puziyjkmfe
Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity
2020
IEEE Access
INDEX TERMS Artificial intelligence, cybersecurity, cyberattacks, machine learning. ...
Traditional cybersecurity solutions are becoming inadequate at detecting and mitigating emerging cyberattacks. ...
SVMs can detect satirical sentiment in sentences that are potentially misleading news [113] , whereas with Naïve Bayes, it is possible to classify topics on Twitter to detect spam or phishing [117] . ...
doi:10.1109/access.2020.2968045
fatcat:tb6xkdqqhfcahb5soip66x5qce
Open source intelligence (OSINT) in a colombian context and sentiment analysis
2018
Revista vínculos
Sentiment analysis can be extremely useful to understand the motivation that an adversary can have and, in this way, define proper cyber defense strategies. ...
Additionally, this paper shows the implementation of three machine learning models used to perform sentiment analysis over the information obtained from an adversary. ...
This paper uses predictive models to make sentiment analysis of information published by an adversary in a social network (Twitter) around a specific topic. ...
doi:10.14483/2322939x.13504
fatcat:uigrqgbquvdbfcoowk5q7wius4
Proceedings of the 11th International Workshop "Data analysis methods for software systems"
2019
Vilnius University Proceedings
DAMSS-2019 is the 11th international workshop on data analysis methods for software systems, organized in Druskininkai, Lithuania, at the end of the year. The same place and the same time every year. ...
Finally, our system was used by psychologists in the clinical experiment and the case study for treatment of anxiety disorders. ...
vitkute-adzgauskiene@vdu.lt While Sentiment Analysis is the task of extraction of subjective information from review texts, Aspect Based Sentiment Analysis (ABSA) is the task of extracting aspect terms ...
doi:10.15388/proceedings.2019.8
fatcat:hb3t35tmpnhlbkzbstyvxfrgyu
Cybercitizen's Experience on Cyber Attacks and Threats from Online Platforms Amidst Pandemic and Community Lockdown
2023
Journal of Legal Subjects
This study sought to uncover the experience cybercitizen's who experienced cyberattacks amidst pandemic and community lockdown. ...
The study is qualitative by nature with 7 identified participants. The results show various means of cyberbullying experienced by the participants. ...
Similarly, participants from other studies about cyberbullying also shared a similar sentiment [17] . ...
doi:10.55529/jls.33.1.8
fatcat:6gys2pi66ne73ld4kraeapsige
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
[chapter]
2022
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
A comparative study of different machine learning classifiers for chronic disease prediction viz Heart Disease & Diabetes Disease is done in this paper. ...
The Solar-Stirling engine systems can be the better option for off-grid power generation. ...
Acknowledgement The authors of this manuscript thanks Uttaranchal University for encouragement and motivation in using advance technology in Horticulture.
7. many research studies are being done to improve ...
doi:10.13052/rp-9788770227667
fatcat:da47mjbbyzfwnbpde7rgbrlppe
Malicious Use of Artificial Intelligence in Sub-Saharan Africa: Challenges for Pan-African Cybersecurity
2022
Vestnik RUDN International Relations
At present, all leading nations are placing greater emphasis on the development of hybrid intelligent systems capable of solving extremely complicated tasks. ...
The present study examines existing practices and risks of malicious use of artificial intelligence (MUAI) in Sub-Saharan African countries. ...
Two main methods are used in this paper: case studies of the level of development in advanced technologies in different Sub-Saharan African countries and critical discourse analysis of different national ...
doi:10.22363/2313-0660-2022-22-2-288-302
fatcat:jtsco5nc2bhqrohglslchst6xa
Attribution Challenges in the Era of Cyber Warfare: Unraveling the Identity of Cyber-Attackers
2023
مجلة المعهد العالي للدراسات النوعية
Based on the use of Twitter data spanning October 13, 2022 to April 6, 2023, with 37,386 tweets from 30,706 users in 54 languages, the study provides the first detailed multilingual analysis of the Russia-Ukraine ...
Using advanced technologies such as language detection, translation, sentiment analysis, TF-IDF, LDA, Porter Stemming, n-grams, and others, the study provides automated cyber intelligence for Russia and ...
doi:10.21608/hiss.2023.337323
fatcat:rrefpkux6jgtzcesihwrffurua
« Previous
Showing results 1 — 15 out of 227 results