An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method
暂无分享,去创建一个
Paulus Insap Santosa | Lukito Edi Nugroho | Prajna Deshanta Ibnugraha | P. Santosa | L. Nugroho | P. Ibnugraha
[1] Komang Rinartha,et al. Comparative study for better result on query suggestion of article searching with MySQL pattern matching and Jaccard similarity , 2017, 2017 5th International Conference on Cyber and IT Service Management (CITSM).
[2] Adhistya Erna Permanasari,et al. Automated Short Answer Scoring using Weighted Cosine Coefficient , 2016, 2016 IEEE Conference on e-Learning, e-Management and e-Services (IC3e).
[3] Santosh K Pandey,et al. A Comparative Study of Risk Assessment Methodologies for Information Systems , 2012 .
[4] Barbara Hauer,et al. Data and Information Leakage Prevention Within the Scope of Information Security , 2015, IEEE Access.
[5] Julio Santisteban,et al. Unilateral Weighted Jaccard Coefficient for NLP , 2015, 2015 Fourteenth Mexican International Conference on Artificial Intelligence (MICAI).
[6] Youness Madani,et al. An Approach of Semantic Similarity Measure between Documents Based on Big Data , 2016 .
[7] Qingchao Yang,et al. Relevant Words Extraction Method in Text Mining , 2013 .
[8] Lior Rokach,et al. Data Leakage Detection/Prevention Solutions , 2012 .
[9] Subburaj Ramasamy,et al. Context Based Classification of Reviews Using Association Rule Mining, Fuzzy Logics and Ontology , 2017 .
[10] Gunnar Ellingsena,et al. CENTERIS 2014-Conference on ENTERprise Information Systems / ProjMAN 2014-International Conference on Project MANagement / HCIST 2014-International Conference on Health and Social Care Information Systems and Technologies Internet of Things and Smart Objects for MHealth Monitoring and Control , 2014 .
[11] Kornelije Rabuzin,et al. HOW TO CALCULATE INFORMATION VALUE FOR EFFECTIVE SECURITY RISK ASSESSMENT , 2006 .
[12] Daniel Dajun Zeng,et al. Mapping users across social media platforms by integrating text and structure information , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).
[13] Shuai Wang,et al. Combination of VSM and Jaccard coefficient for external plagiarism detection , 2013, 2013 International Conference on Machine Learning and Cybernetics.
[14] Bernhard Ager,et al. Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic? , 2015, IEEE Security & Privacy.
[15] Wenxian Xiao,et al. Information Security Risk Assessment Based on Information Measure and Fuzzy Clustering , 2011, J. Softw..
[16] Kwangho Song,et al. An Improvement of Plagiarized Area Detection System Using Jaccard Correlation Coefficient Distance Algorithm , 2015 .