-
ML Concepts: Words Embedding
Intro I keep going with the motivation of my upcoming small/simple session about ML and Cybersecurity. Last time I discussed an unsupervised clustering algorithm. We used multi-dimensional points (coordinates) in space. But what if our data is text? That’s common in “general”, but also in Cybersecurity. So the question becomes: Can we treat “text” as…
-
A quick look at CISA KEV
Intro I keep hearing about it, so it was time I had a look at that famous CISA “Known Exploited Vulnerability” dataset. Also, it’s been a while since I did something more directly related to IT Security, so this is good. It turns out, it’s quite… Simple (the dataset), and even clean, which makes things…
-
NLP (3/n): Parts of Speech Tagging
Intro So I’ve been working on other things lately, but I wanted to keep improving/practicing a bit with the NLP concepts. As I mentioned already, I spent a bit of my (little) spare time to review concepts. One book I am finding I rely heavily upon is “Mastering Text Mining with R”, from the Packt…