Learn More
This paper presents a new generic text summarization method using Non-negative Matrix Factorization (NMF) to estimate sentence relevance. Proposed sentence relevance estimation is based on normalization of NMF topic space and further weighting of each topic using sentences representation in topic space. The proposed method shows better summarization quality(More)
This paper presents a new generic text summarization method using Non-negative Matrix Factorization (NMF) to estimate sentence relevance. Proposed sentence relevance estimation is based on normalization of NMF topic space and further weighting of each topic using sentences representation in topic space. The proposed method shows better summarization quality(More)
КЛЮЧЕВЫЕ СЛОВА Безопасность и противодействие терроризму; машинное обучение; текстовая аналитика; тематическое моделирование; неотрицательная матричная факторизация. ANNOTATION Nowadays there are growing number and damage of terrorist attacks carried out by lone terrorists BLOCKINunder BLOCKINthe BLOCKINinfluence BLOCKINof BLOCKINpropaganda BLOCKINand(More)
Currently, the greatest risks for information security of organizations are internal, rather than external, threats. Data loss prevention (DLP) systems are used for minimization of risks related to internal threats. The main function of the DLP systems is to prevent leak of confidential data; however, comparison of the DLP systems relies currently on their(More)
Nowadays there is a growing interest to active authentication methods in security society. These methods are used for user identity validation with behavioral biometrics such as keystroke or mouse moving dynamics. In this article a new hybrid method for active authentication using keystroke dynamics is presented. This method is a combination of a new(More)
In the paper we describe the NMF-based approach applied to the problem of determining an employee's access needs. The conducted research showed that the proposed NMF-based methods provide a useful analytical framework for processing and modeling employee's access needs data, and the obtained results demonstrate acceptable performance and provide descriptive(More)
— In this paper we investigate the problem of development effective program security systems that are used for defense against internal intrusions. We offer technology for constructing systems that protect against the internal intrusions based on non signature methods. These systems possess autonomy, adaptability and self-teach properties. We propose(More)
  • 1