2021
DOI: 10.1145/3462477
|View full text |Cite
|
Sign up to set email alerts
|

Text Mining in Cybersecurity

Abstract: The growth of data volume has changed cybersecurity activities, demanding a higher level of automation. In this new cybersecurity landscape, text mining emerged as an alternative to improve the efficiency of the activities involving unstructured data. This article proposes a Systematic Literature Review ( SLR ) to present the application of text mining in the cybersecurity domain. Using a systematic protocol, we identified 2,196 studies, out of which 83 were summ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(8 citation statements)
references
References 129 publications
0
8
0
Order By: Relevance
“…The application of text mining in the field of cybersecurity is presented in this paper using a systematic literature review [6]. They found 2196 research using a methodical protocol, 83 of which were summarised and offered a taxonomy as a contribution to illustrate the many text mining-supported activities in the cybersecurity field [6].…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…The application of text mining in the field of cybersecurity is presented in this paper using a systematic literature review [6]. They found 2196 research using a methodical protocol, 83 of which were summarised and offered a taxonomy as a contribution to illustrate the many text mining-supported activities in the cybersecurity field [6].…”
Section: Literature Reviewmentioning
confidence: 99%
“…There is enormous potential to analyse the data with the aid of AI, ML, and NLP [6] due to the accumulation of a huge amount of cybercrime data, which may include complaint text or investigation description. Numerous applications in law enforcement, such as text summarisation, relationship extraction, crime prediction, criminal intelligence collecting etc., are now possible thanks to substantial research in the field of NLP [5].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared with the traditional arcuate baffle support for nuclear power, this support structure changes the shell-side fluid from the transversely swept tube bundle to the longitudinally swept tube bundle, which can effectively reduce the flow dead zone and reduce the vibration induced by the tube bundle. And due to the fluid jet generated in the hole of the support plate, the deposition of chemical substances, corrosive substances, etc., on the wall of the heat exchange tube can be reduced, so that the heat transfer and corrosion conditions in the area near the wall of the heat exchange tube are greatly improved; the probability of heat exchanger failure is reduced [12].…”
Section: Brief Introduction Of Three-leaf Orifice Plate Heatmentioning
confidence: 99%
“…These features can be key words or phrases that often appear in documents. The modeling stage is done to build a classification or clustering model that can be used to predict or classify text data [15].…”
Section: Text Mining Techniquesmentioning
confidence: 99%