Keywords Review of IT Security Literature in Recent 20 Years

Full Text (PDF, 195KB), PP.34-40

Views: 0 Downloads: 0

Author(s)

QIAN Liping 1,* LIN Yan 1 WANG Lidong 2

1. Beijing University of Civil Engineering and Architecture, Beijing, China

2. National Institute of Network Information Security, Beijing, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2012.05.05

Received: 12 Jun. 2012 / Revised: 19 Jul. 2012 / Accepted: 4 Sep. 2012 / Published: 15 Oct. 2012

Index Terms

Lexicon, IT Security, Scientific Literature, Vocabulary, RFC2828

Abstract

The volume of published scientific literature available on Internet has been increasing exponentially. Some of them reflect the latest achievement of the specific research domain. In recent years, many projects have been funded aiming to online scientific literature mining, especially in biomedical research. Scientific literature covers most of the hot topics in the research field and has a very large domain-specific vocabulary. The exploitation of domain knowledge and specialized vocabulary can dramatically improve the result of literature text processing. The purpose of this paper is to identify the frequently used keywords in IT security literatures. The result then can be utilized to improve the performance of automatic IT security document retrieval, identification and classification. Our method is to query CiteseeX to retrieve source data of paper description information and build an artificially annotated corpus. Over the corpus, we perform words frequency statistics, word co-occurrence analysis, discrimination index computation, retrieval efficiency analysis and thus build a lexicon of IT security based on our experimental result. The lexicon can further be used in improving retrieval performance and assisting new words discovering and document classification.

Cite This Paper

QIAN Liping, LIN Yan, WANG Lidong,"Keywords Review of IT Security Literature in Recent 20 Years", IJWMT, vol.2, no.5, pp.34-40, 2012. DOI: 10.5815/ijwmt.2012.05.05

Reference

[1]Ingrid Petric, Tanja Urbancic, Bojan Cestnik. Discovering Hidden Knowledge from Biomedical Literature. Informatica, vol. 31, pp. 15-20, Mar. 2007.

[2]D. Shilin, H.Minlie, W.Hongning, Xiaoyan Zhu. Profile-feature Based Protein Interaction Extraction from Full-Text Articles. Proc. of the 7th BIOKDD Workshop in the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Aug. 2007, pp. 42-49, published online: http://bio.informatics.iupui.edu/ biokdd07/BIOKDD07_Proceedings.pdf.

[3]L. Yudong, S.Zhongmin, S.Anoop. Exploiting Rich Syntactic Information for Relation Extraction from Biomedical Articles. Proc. of the Annual Conference of the NAACL-HLT 2007, Companion Volume, Apr. 2007, pp. 97-100.

[4]A. M. Cohen, W.R.Hersh. A Survey of Current Work in Biomedical Text Mining. Briefings in Bioinformaties, vol. 6, Mar. 2005, pp. 57-71, doi:10.1093/bib/6.1.57.

[5]L.Venkata Subramaniam, Sougata Mukherjea, Pankaj Kankar. Information Extraction from Biomedical Literature: Methodology, Evaluation and an Application. Proc. of the 12th International Conference on Information and Knowledge Management, ACM, Nov. 2003, pp. 410-417, doi: 10.1145/956863.956941.

[6]C. Ramakrishnan, K. J. Knchut, A. P.Sheth. A Framework for Schema-Driven Relationship Discovery from Unstructured Text. Lecture Notes in Computer Science, Springer Berlin/Heidelberg, vol. 4273/2006. International Semantic Web Conference Nov. 2006, pp. 583-596, doi: 10.1007/11926078.

[7]Simon Hansman. A Taxonomy of Network and Computer Attacks. Computers & Security. Vol. 24, Feb. 2005, pp.31-43, doi:10.1016/j.cose.2004.06.011.

[8]Ali Abbas. A Comprehensive Approach to Designing Internet Security Taxonomy. Proc. of the Canadian Conference on Electrical and Computer Engineering, 2006 (CCECE’06), IEEE Press, May 2006, pp. 1316-1319, doi: 10.1109/CCECE.2006.277393.

[9]R. Shirey. Internet Security Glossary, RFC 2828, The Internet Engineering Task Force, May 2000.