NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Arielle A. Gaither – ProQuest LLC, 2021
Bag-of-words is a commonly used text representation method for many text classification applications. However, bag-of-words representation fails to consider the context of the text because it only examines text documents based on the presence of individual words and explores relationships between texts with similar word choices (Bengfort, 2018).…
Descriptors: Journal Articles, Classification, Language Usage, Databases
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Li, Fengjun – ProQuest LLC, 2010
As enormous structured, semi-structured and unstructured data are collected and archived by organizations in many realms ranging from business to health networks to government agencies, the needs for efficient yet secure inter-organization information sharing naturally arise. Unlike early information sharing approaches that only involve a small…
Descriptors: Information Security, Databases, Institutional Cooperation, Privacy
Dragut, Eduard Constantin – ProQuest LLC, 2010
An increasing number of Web sites expose their content via query interfaces, many of them offering the same type of products/services (e.g., flight tickets, car rental/purchasing). They constitute the so-called "Deep Web". Accessing the content on the Deep Web has been a long-standing challenge for the database community. For a user interested in…
Descriptors: Internet, Web Sites, Search Engines, Information Retrieval
Huang, Jian – ProQuest LLC, 2010
With the increasing wealth of information on the Web, information integration is ubiquitous as the same real-world entity may appear in a variety of forms extracted from different sources. This dissertation proposes supervised and unsupervised algorithms that are naturally integrated in a scalable framework to solve the entity resolution problem,…
Descriptors: Electronic Libraries, Language Processing, Profiles, Social Networks
Alemneh, Daniel Gelaw – ProQuest LLC, 2009
Digital preservation is a significant challenge for cultural heritage institutions and other repositories of digital information resources. Recognizing the critical role of metadata in any successful digital preservation strategy, the Preservation Metadata Implementation Strategies (PREMIS) has been extremely influential on providing a "core" set…
Descriptors: Preservation, Metadata, Cultural Background, Museums
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Song, Sang Chul – ProQuest LLC, 2010
An unprecedented amount of information encompassing almost every facet of human activities across the world is generated daily in the form of zeros and ones, and that is often the only form in which such information is recorded. A good fraction of this information needs to be preserved for periods of time ranging from a few years to centuries.…
Descriptors: Information Needs, Information Sources, Indexing, Access to Information