Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 38 publications
0
8
0
Order By: Relevance
“…Given a text T , the main idea is to compute the distance between T and a set of k additional texts , known as attribute generators (AGs). This provides a vector of k numbers that represents the text T in a k -dimensional attribute space, and can be used as input for a classification algorithm [ 12 ]. Although in this work we have used a SVM classifier, it is necessary to highlight that our methodology for attributes extraction can be used with any other classification algorithm.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Given a text T , the main idea is to compute the distance between T and a set of k additional texts , known as attribute generators (AGs). This provides a vector of k numbers that represents the text T in a k -dimensional attribute space, and can be used as input for a classification algorithm [ 12 ]. Although in this work we have used a SVM classifier, it is necessary to highlight that our methodology for attributes extraction can be used with any other classification algorithm.…”
Section: Methodsmentioning
confidence: 99%
“…We use the scikit-learn Python library [ 47 ] for the implementation, and measure the quality of the classifiers by using the accuracy (ACC) and the area under the receiver operating characteristic curve (AUC) metrics. The SVM model depends on two hyperparameters, the complexity C and the kernel width , which are tuned, for each k , using a standard 5-fold cross-validation strategy as described in [ 12 ]. The results presented in Section 4 are averaged over 10 different partitions of the data into the G and I sets.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“… Software: The rapid pace of how the software is being used makes it almost impossible not to use open forums/repositories to solve our needs. This creates software security breaches that compromise user data even on data in transit [ 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ]. Malware: In recent years, companies have been attacked with malware.…”
Section: Kolmogorov Complexity Application Scenariosmentioning
confidence: 99%
“…The possibilities of using this information have been explored by many authors with proven results [ 70 ]. A solution proposed by Gonzalo de la Torre-Abaitua et al [ 27 , 28 ], shows the possibility of using NCD to perform proper analysis of the log files of multiple services to detect anomalies at an early stage. The authors identify five main topics, but the two most important are URL identification domain generation algorithms and Domain Generation Algorithms (DGA), which are important when parsing log files.…”
Section: Kolmogorov Complexity Application Scenariosmentioning
confidence: 99%