228 research outputs found
1st International Workshop on Search and Mining Terrorist Online Content and Advances in Data Science for Cyber Security and Risk on the Web
The deliberate misuse of technical infrastructure (including the Web and social media) for cyber deviant and cybercriminal behaviour, ranging from the spreading of extremist and terrorism-related material to online fraud and cyber security attacks, is on the rise. This workshop aims to better understand such phenomena and develop methods for tackling them in an effective and efficient manner. The workshop brings together interdisciplinary researchers and experts in Web search, security informatics, social media analysis, machine learning, and digital forensics, with particular interests in cyber security. The workshop programme includes refereed papers, invited talks and a panel discussion for better understanding the current landscape, as well as the future of data mining for detecting cyber deviance
Detecting hate speech on twitter using a convolution-GRU based deep neural network
In recent years, the increasing propagation of hate speech on social media and the urgent need for effective counter-measures have drawn significant investment from governments, companies, as well as empirical research. Despite a large number of emerging scientific studies to address the problem, existing methods are limited in several ways, such as the lack of comparative evaluations which makes it difficult to assess the contribution of individual works. This paper introduces a new method based on a deep neural network combining convolutional and long short term memory networks, and conducts an extensive evaluation of the method against several baselines and state of the art on the largest collection of publicly available datasets to date. We show that our proposed method outperforms state of the art on 6 out of 7 datasets by between 0.2 and 13.8 points in F1. We also carry out further analysis using automatic feature selection to understand the impact of the conventional manual feature engineering process that distinguishes most methods in this field. Our findings challenge the existing perception of the importance of feature engineering, as we show that: the automatic feature selection algorithm drastically reduces the original feature space by over 90% and selects predominantly generic features from datasets; nevertheless, machine learning algorithms perform better using automatically selected features than the original features
Universal trapping scaling on the unstable manifold for a collisionless electrostatic mode
An amplitude equation for an unstable mode in a collisionless plasma is
derived from the dynamics on the two-dimensional unstable manifold of the
equilibrium. The mode amplitude decouples from the phase due to the
spatial homogeneity of the equilibrium, and the resulting one-dimensional
dynamics is analyzed using an expansion in . As the linear growth rate
vanishes, the expansion coefficients diverge; a rescaling
of the mode amplitude absorbs these
singularities and reveals that the mode electric field exhibits trapping
scaling as . The dynamics for
depends only on the phase where is the derivative of the dielectric as
.Comment: 11 pages (Latex/RevTex), 2 figures available in hard copy from the
Author ([email protected]); paper accepted by Physical Review
Letter
Nonlinear saturation of electrostatic waves: mobile ions modify trapping scaling
The amplitude equation for an unstable electrostatic wave in a multi-species
Vlasov plasma has been derived. The dynamics of the mode amplitude is
studied using an expansion in ; in particular, in the limit
, the singularities in the expansion coefficients are
analyzed to predict the asymptotic dependence of the electric field on the
linear growth rate . Generically , as
, but in the limit of infinite ion mass or for
instabilities in reflection-symmetric systems due to real eigenvalues the more
familiar trapping scaling is predicted.Comment: 13 pages (Latex/RevTex), 4 postscript encapsulated figures which are
included using the utility "uufiles". They should be automatically included
with the text when it is downloaded. Figures also available in hard copy from
the authors ([email protected]
On Unbounded Composition Operators in -Spaces
Fundamental properties of unbounded composition operators in -spaces are
studied. Characterizations of normal and quasinormal composition operators are
provided. Formally normal composition operators are shown to be normal.
Composition operators generating Stieltjes moment sequences are completely
characterized. The unbounded counterparts of the celebrated Lambert's
characterizations of subnormality of bounded composition operators are shown to
be false. Various illustrative examples are supplied
Organised crime and social media; a system for detecting, corroborating and visualising weak signals of organised crime online
This paper describes an approach for detecting the presence or emergence of
Organised Crime (OC) signals on Social Media. It shows how words and phrases,
used by members of the public in Social Media posts, can be treated as weak
signals of OC, enabling information to be classi�ed according to a taxonomy.
Formal Concept Analysis (FCA) is used to group information sources, according
to Crime-type and Location, thus providing a means of corroboration and
creating OC Concepts that can be used to alert police analysts to the possible
presence of OC. The analyst is able to `drill down' into an OC Concept of
interest, discovering additional information that may be pertinent to the crime.
The paper describes the implementation of this approach into a fully-functional
prototype software system, incorporating a Social Media scanning system and a
map-based user interface. The approach and system are illustrated using Human
Tra�cking and Modern Slavery as an example. Real data is used to obtain results
that show that weak signals of OC have been detected and corroborated, thus
alerting to the possible presence of OC
Sentiment analysis on predicting presidential election: Twitter used case
© Springer Nature Switzerland AG 2020. Twitter is a popular tool for social interaction over the Internet. It allows users to share/post opinions, social media events, and interact with other political and ordinary people. According to Statista web site 2019 statistical report, it estimated that the number of users on Twitter had grown dramatically over the past couple of years to research 300 million users. Twitter has become the largest source of news and postings for key presidents and political figures. Referring to the Trackalytics 2019 report, the recent president of the USA had posted 4,000 tweets per year, which indicates an average of 11–12 tweets per day. Our research proposes a technique that extracts and analyzes tweets from blogs and predicts election results based on tweets analysis. It assessed the people’s opinion and studied the impact that might predict the final results for the Turkey 2018 presidential election candidates. The final results were compared with the actual election results and had a high accuracy prediction percentage based on the collected 22,000 tweets
Evolutionary tradeoffs in cellular composition across diverse bacteria
One of the most important classic and contemporary interests in biology is the connection between cellular composition and physiological function. Decades of research have allowed us to understand the detailed relationship between various cellular components and processes for individual species, and have uncovered common functionality across diverse species. However, there still remains the need for frameworks that can mechanistically predict the tradeoffs between cellular functions and elucidate and interpret average trends across species. Here we provide a comprehensive analysis of how cellular composition changes across the diversity of bacteria as connected with physiological function and metabolism, spanning five orders of magnitude in body size. We present an analysis of the trends with cell volume that covers shifts in genomic, protein, cellular envelope, RNA and ribosomal content. We show that trends in protein content are more complex than a simple proportionality with the overall genome size, and that the number of ribosomes is simply explained by cross-species shifts in biosynthesis requirements. Furthermore, we show that the largest and smallest bacteria are limited by physical space requirements. At the lower end of size, cell volume is dominated by DNA and protein content—the requirement for which predicts a lower limit on cell size that is in good agreement with the smallest observed bacteria. At the upper end of bacterial size, we have identified a point at which the number of ribosomes required for biosynthesis exceeds available cell volume. Between these limits we are able to discuss systematic and dramatic shifts in cellular composition. Much of our analysis is connected with the basic energetics of cells where we show that the scaling of metabolic rate is surprisingly superlinear with all cellular components
Impact and key challenges of insider threats on organizations and critical businesses
The insider threat has consistently been identified as a key threat to organizations and governments. Understanding the nature of insider threats and the related threat landscape can help in forming mitigation strategies, including non-technical means. In this paper, we survey and highlight challenges associated with the identification and detection of insider threats in both public and private sector organizations, especially those part of a nation’s critical infrastructure. We explore the utility of the cyber kill chain to understand insider threats, as well as understanding the underpinning human behavior and psychological factors. The existing defense techniques are discussed and critically analyzed, and improvements are suggested, in line with the current state-of-the-art cyber security requirements. Finally, open problems related to the insider threat are identified and future research directions are discussed
- …
