{"title":"Block-Cloud: The new paradigm of Cloud Computing","authors":"Cearnau Dan-Cristian","doi":"10.12948/ei2019.01.02","DOIUrl":"https://doi.org/10.12948/ei2019.01.02","url":null,"abstract":"","PeriodicalId":173818,"journal":{"name":"ECONOMY INFORMATICS JOURNAL","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126020405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence of New Technologies in E-Commerce","authors":"Oprescu Paul George","doi":"10.12948/ei2019.01.03","DOIUrl":"https://doi.org/10.12948/ei2019.01.03","url":null,"abstract":"","PeriodicalId":173818,"journal":{"name":"ECONOMY INFORMATICS JOURNAL","volume":"5 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123790369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rust – The Programming Language for Every Industry","authors":"Cartas Cosmin","doi":"10.12948/ei2019.01.05","DOIUrl":"https://doi.org/10.12948/ei2019.01.05","url":null,"abstract":"","PeriodicalId":173818,"journal":{"name":"ECONOMY INFORMATICS JOURNAL","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117021783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article presents a semantic indexing software system which uses natural language processing (NLP) techniques to understand documents related to cybersecurity. The purpose of this solution is to facilitate the cybersecurity documentation process as well as increasing cybersecurity awareness. The solution automatically collects documents related to cybersecurity available on the internet, keep relevant data, perform a cognitive analysis and enrich the documents, store the annotated documents and offer the possibility to access them according to users’ choices. The paper describes the components of the system, the methods, technologies and tools proposed in order to implement the system. The solution includes a domain ontology and a machine learning (ML) model specialized in cybersecurity as well as a scraper to automatically download relevant data.
{"title":"Machine Learning Based System for Semantic Indexing Documents Related to Cybersecurity","authors":"Georgescu Tiberiu Marian","doi":"10.12948/ei2019.01.01","DOIUrl":"https://doi.org/10.12948/ei2019.01.01","url":null,"abstract":"This article presents a semantic indexing software system which uses natural language processing (NLP) techniques to understand documents related to cybersecurity. The purpose of this solution is to facilitate the cybersecurity documentation process as well as increasing cybersecurity awareness. The solution automatically collects documents related to cybersecurity available on the internet, keep relevant data, perform a cognitive analysis and enrich the documents, store the annotated documents and offer the possibility to access them according to users’ choices. The paper describes the components of the system, the methods, technologies and tools proposed in order to implement the system. The solution includes a domain ontology and a machine learning (ML) model specialized in cybersecurity as well as a scraper to automatically download relevant data.","PeriodicalId":173818,"journal":{"name":"ECONOMY INFORMATICS JOURNAL","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129162773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}