Essays about: "Detection rule"
Showing result 1 - 5 of 35 essays containing the words Detection rule.
-
1. Coreference Resolution for Swedish
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This report explores possible avenues for developing coreference resolution methods for Swedish. Coreference resolution is an important topic within natural language processing, as it is used as a preprocessing step in various information extraction tasks. READ MORE
-
2. Artificial Intelligence and Corporate Social Responsibility in the Online Gambling Industry
University essay from Göteborgs universitet/Graduate SchoolAbstract : Background: Digital technology and the Internet have created the preconditions for the development of online gambling. Gamblers can play or bet online whenever they want and wherever they are. Gambling should be entertaining, allowing players to keep it in balance with other activities in their lives. READ MORE
-
3. A Performance Analysis of Intrusion Detection with Snort and Security Information Management
University essay from Linköpings universitet/Databas och informationsteknikAbstract : Network intrusion detection systems (NIDSs) are a major component in cybersecurity and can be implemented with open-source software. Active communities and researchers continue to improve projects and rulesets used for detecting threats to keep up with the rapid development of the internet. READ MORE
-
4. Natural Language Processing techniques for feedback on text improvement : A qualitative study on press releases
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Press releases play a key role in today’s news production by being public statements of newsworthy content that function as a pre-formulation of news. Press releases originate from a wide range of actors, and a common goal is for them to reach a high societal impact. READ MORE
-
5. A Real- time Log Correlation System for Security Information and Event Management
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The correlation of several events in a period of time is a necessity for a threat detection platform. In the case of multistep attacks (attacks characterized by a sequence of executed commands), it allows detecting the different steps one by one and correlating them to raise an alert. READ MORE
