Your browser does not support JavaScript. Please to enable it.

Terms & Conditions

The idea you wish to view belongs to a community that requires acceptance of terms and conditions.

RejectAccept

    Help to Improve This Idea.

    What's New

    Search

     
    Prev | Next

    Analyze Cybersecurity documents with texting mining and machine learning techniques.

    by Bojian Zhang 02/27/2018 07:34 PM GMT

    • {{:upVoteCount}}
    • {{:downVoteCount}}
    Username * ()

      I accept the terms and conditions (see side bar). I understand all content I am submitting must be licensed under an open-source software or Creative Commons license as described in the Terms and Conditions:

      on

      Description

      We will focus on the following improvements:

      1.Tokenization

      Make the connection of the sentences with similar meanings.

      Make sure to keep the completeness of the meaning of the sentences.

      2.Extraction.

      Extract more meaningful contents from the documents.

      3.Classification.

      Enhance the match accuracy of categorizations with sentences.

      4.Multi-lingual support.

      Perform classification on non-English documents.

      Main Challenges:

      1.Building a proper dictionary.

      2.Analyzing different languages.

      Methodology and Tools:

      Python NLP:Textract, NLTK, Goslate, Scikit Learn, Spacy

      Co-authors to your solution

      Chien Min Wang, Yichao Li, Aidi Li, Xiansheng Zhang

      Link to your concept design and documentation (Required by the final day of the Submission & Collaboration phase)

      https://github.com/UniteIdeas/CyberSecurityNLP/issues/1

      Link to an online working solution or prototype (Required by the final day of the Submission & Collaboration phase):

      https://github.com/UniteIdeas/CyberSecurityNLP/issues/1

      Link to a video or screencast of your solution or prototype (Required by the final day of the Submission & Collaboration phase):

      https://youtu.be/5KFF_vA7gJI

      Link to source code of your solution or prototype above. (If you submitted a link to an online solution or prototype, or to a video of your solution of prototype, you must provide a link to the source code. This item is required by the final day of the submission phase):

      https://github.com/UniteIdeas/CyberSecurityNLP/issues/1

      Attachments

        Help to Improve This Idea.

        0%
        0%
        100%
        No ideas found!

        Request to become a member

        Type a short message to the owner of this idea.:

        Invite Team Members

          Message
          *Required