2013
DOI: 10.1016/j.cose.2013.02.004
|View full text |Cite
|
Sign up to set email alerts
|

Using network-based text analysis to analyze trends in Microsoft's security innovations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…The openness and availability of such services to all users have led to the steady growth of application layer attacks in comparison to other layers such as the physical and network layers. This claim is also strongly supported by current reports including the NIST database [3]. Another independent source, Gartner Group has suggested that more than 72% of the security attacks that target organizations reside within the application layer of cloud and web services, generally illustrated in the Figure 1.…”
Section: Introductionmentioning
confidence: 74%
“…The openness and availability of such services to all users have led to the steady growth of application layer attacks in comparison to other layers such as the physical and network layers. This claim is also strongly supported by current reports including the NIST database [3]. Another independent source, Gartner Group has suggested that more than 72% of the security attacks that target organizations reside within the application layer of cloud and web services, generally illustrated in the Figure 1.…”
Section: Introductionmentioning
confidence: 74%
“…Confidentiality includes the means to protect personal privacy and proprietary information (Parker, 2010). Integrity refers to capturing accurate information and preventing unauthorised changes (James et al, 2013; Samonas and Coss, 2014). Availability ensures timely and reliable access to and use of information (Parker, 2010, p. 14).…”
Section: Theoretical Foundation: the Cia Triad Modelmentioning
confidence: 99%
“…However, if the data set exceeds a certain level of magnitude, the task of exploring, and navigating becomes increasingly difficult. More specifically, there is extensive work on representing textual data as graphs and the subsequent application of network text analysis (e.g., Losiewicz et al, 2000;Grbic et al, 2013;James et al, 2013;Guan et al, 2014) for gaining an increased understanding of influential concepts, text's meanings, and structure. Network analysis is therefore also suitable for linguistic comparative analyses which focus on semantic relations between words, often framed through the co-occurrence of terms (i.e., relevant terms that more often appear in the same text are more likely to share some semantic connection).…”
Section: Introductionmentioning
confidence: 99%