Your browser does not support JavaScript. Please to enable it.

Terms & Conditions

The idea you wish to view belongs to a community that requires acceptance of terms and conditions.

RejectAccept

    Help to Improve This Idea.

    Search

     
    Prev | Next

    Cybersecurity Analysis based on Machine Learning

    by Haojunzhi Yu 03/01/2018 03:33 AM GMT

    • {{:upVoteCount}}
    Username * ()

        Move idea from "Expert Review" stage to:

          Collapse
          I accept the terms and conditions (see side bar). I understand all content I am submitting must be licensed under an open-source software or Creative Commons license as described in the Terms and Conditions:

          on

          Description

          We will focus on following improvements:

          1. Data collection

                    Transfer data from PDF to text files.

          1. Text extraction

                    Extract text contents from the documents.

          1. Sentence tokenizing

                    Remove stop words, group sentences with similar meanings, and mark groups with certain labels.

          1. Classification of category and subcategories

                    Classify each group based on meaning of sentences.

                5.  Interface for easily indicating the location of files

          Implementation Method:

                     Tools/Platforms: Anaconda(Jupyter), SPSS Modeler

                     Python Packages: NLTK, pdfminer3k, Scikit Learn, etc

          Main challenges:

                     Building proper dictionary

                     Classifying the policies

                     Making user-friendliness interface

          Timeline:

          1. Before February 28th: Idea
          2. Before March 10th: Data collection & Methodology & Tools choosing
          3. Before April 25th: Realization & Results
          4. Before May 3th: Improvements
          5. Final results & presentation

          Expected Outcomes:

          Building a user-friendliness dictionary

           

           

           

           

           

          Co-authors to your solution

          Zijing Yu, Qinruo Wu, Zihao Wang

          Link to your concept design and documentation (Required by the final day of the Submission & Collaboration phase)

          Link to an online working solution or prototype (Required by the final day of the Submission & Collaboration phase):

          Link to a video or screencast of your solution or prototype (Required by the final day of the Submission & Collaboration phase):

          Link to source code of your solution or prototype above. (If you submitted a link to an online solution or prototype, or to a video of your solution of prototype, you must provide a link to the source code. This item is required by the final day of the submission phase):

          Cybersecurity,Classification,Tokenization,Interface,Text Analytics,Data Extraction

          Move this Idea

          Select a Category

          Close this idea

          When closing an idea, you must determine whether the idea has exited successfully or unsuccessfully.

          Request to become a member

          Type a short message to the owner of this idea.:

          Invite Team Members

            Message
            *Required

            Help to Improve This Idea.

            0%
            33%
            0%
            User Tasks ?
            Required for graduation.
            Task Assigned to Due Date Status
            Approval 06/16/2018 Completed
            on 05/04/2018
            Judge review 05/16/2018 Incomplete
            Judge review 05/16/2018 Incomplete
            No ideas found!
            No activities yet.