M. Poltavtseva, Pavel V. Semyanov, Elizaveta A. Zaitzeva
{"title":"信息安全中的异构半结构化数据分析","authors":"M. Poltavtseva, Pavel V. Semyanov, Elizaveta A. Zaitzeva","doi":"10.1109/EnT50437.2020.9431309","DOIUrl":null,"url":null,"abstract":"When solving information security problems, one needs to analyze and evaluate the similarity of heterogeneous semi-structured objects sets. The authors propose to use for this an approach on the basis of case analysis. The data is represented as a set of objects (use cases), each of which is described by a variable set of properties. The paper proposes measures to evaluate the similarity of individual objects and precedents, presents the results of the similarity evaluation method experimental testing. The authors present the architecture of the analysis system and the method of its learning.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Heterogeneous Semi-Structured Data Analysis in Information Security\",\"authors\":\"M. Poltavtseva, Pavel V. Semyanov, Elizaveta A. Zaitzeva\",\"doi\":\"10.1109/EnT50437.2020.9431309\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"When solving information security problems, one needs to analyze and evaluate the similarity of heterogeneous semi-structured objects sets. The authors propose to use for this an approach on the basis of case analysis. The data is represented as a set of objects (use cases), each of which is described by a variable set of properties. The paper proposes measures to evaluate the similarity of individual objects and precedents, presents the results of the similarity evaluation method experimental testing. The authors present the architecture of the analysis system and the method of its learning.\",\"PeriodicalId\":129694,\"journal\":{\"name\":\"2020 International Conference Engineering and Telecommunication (En&T)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference Engineering and Telecommunication (En&T)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EnT50437.2020.9431309\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference Engineering and Telecommunication (En&T)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EnT50437.2020.9431309","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Heterogeneous Semi-Structured Data Analysis in Information Security
When solving information security problems, one needs to analyze and evaluate the similarity of heterogeneous semi-structured objects sets. The authors propose to use for this an approach on the basis of case analysis. The data is represented as a set of objects (use cases), each of which is described by a variable set of properties. The paper proposes measures to evaluate the similarity of individual objects and precedents, presents the results of the similarity evaluation method experimental testing. The authors present the architecture of the analysis system and the method of its learning.