Tutorial: Text Analytics for Security

被引:1
|
作者
Xie, Tao [1 ]
Enck, William [2 ]
机构
[1] Univ Illinois, Dept Comp Sci, 1304 W Springfield Ave, Urbana, IL 61801 USA
[2] North Carolina State Univ, Dept Comp Sci, Raleigh, NC USA
关键词
Security; human expectations; text analytics;
D O I
10.1145/2898375.2898397
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Computing systems that make security decisions often fail to take into account human expectations. This failure occurs because human expectations are typically drawn from in textual sources (e.g., mobile application description and requirements documents) and are hard to extract and codify. Recently, researchers in security and software engineering have begun using text analytics to create initial models of human expectation. In this tutorial, we provide an introduction to popular techniques and tools of natural language processing (NLP) and text mining, and share our experiences in applying text analytics to security problems. We also highlight the current challenges of applying these techniques and tools for addressing security problems. We conclude the tutorial with discussion of future research directions.
引用
收藏
页码:124 / 125
页数:2
相关论文
共 50 条
  • [41] VaultBox: Enhancing the Security and Effectiveness of Security Analytics
    Trivedi, Devharsh
    Triandopoulos, Nikos
    SCIENCE OF CYBER SECURITY, SCISEC 2023, 2023, 14299 : 401 - 422
  • [42] Tutorial: Big Data Analytics: Concepts, Technologies, and Applications
    Watson, Hugh J.
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2014, 34 : 1247 - 1268
  • [43] Practical text analytics: maximizing the value of text data
    Shanmugam, Ramalingam
    JOURNAL OF STATISTICAL COMPUTATION AND SIMULATION, 2020, 90 (07) : 1346 - 1346
  • [44] Tutorial: Big data analytics: Concepts, technologies, and applications
    Watson, Hugh J.
    Watson, H. J. (hwatson@uga.edu), 1600, Association for Information Systems (34): : 1247 - 1268
  • [45] Analytics for Good: Predicting Secondary Education Attainment with Text Analytics
    Powers, Jonathan
    Bergman, Shawn
    Cazier, Joseph
    AMCIS 2015 PROCEEDINGS, 2015,
  • [46] Analysis of information security reliability: A tutorial
    Kondakci, Suleyman
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2015, 133 : 275 - 299
  • [47] TUTORIAL - CRYPTOGRAPHY AND DATA-SECURITY
    SALOMAA, A
    LECTURE NOTES IN COMPUTER SCIENCE, 1989, 381 : 220 - 244
  • [48] Security and composition of cryptographic protocols: A tutorial
    Canetti, R., 1600, IOS Press BV (10):
  • [49] Visual Analytics for Network Security
    Shurkhovetskyy, Georgiy
    Bahey, Ahmed
    Ghoniem, Mohammad
    2012 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST), 2012, : 301 - 302
  • [50] A Tutorial on Text-Independent Speaker Verification
    Frédéric Bimbot
    Jean-François Bonastre
    Corinne Fredouille
    Guillaume Gravier
    Ivan Magrin-Chagnolleau
    Sylvain Meignier
    Teva Merlin
    Javier Ortega-García
    Dijana Petrovska-Delacrétaz
    Douglas A. Reynolds
    EURASIP Journal on Advances in Signal Processing, 2004