
Semantic Control for the Cybersecurity Domain
Investigation on the Representativeness of a Domain-Specific Terminology Referring to Lexical Variation
- 170 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Semantic Control for the Cybersecurity Domain
Investigation on the Representativeness of a Domain-Specific Terminology Referring to Lexical Variation
About this book
This book presents the creation of a bilingual thesaurus (Italian and English), and its conversion into an ontology system, oriented to the Cybersecurity field of knowledge term management and the identification of a replicable method over other specialized areas of study, through computational linguistics procedures, to a statistical and qualitative measurement of the terminological coverage threshold a controlled vocabulary is able to guarantee with respect to the semantic richness proper to the domain under investigation. The volume empowers readers to compile and study significant corpora documentations to support the text mining tasks and to establish a representativeness evaluation of the information retrieved. Through a description of several techniques belonging to the field of linguistics and knowledge engineering, this monograph provides a methodological account on how to enhance and update semantic monitoring tools reflecting a specialized lexicon as that of Cybersecurity to grant a reference semantic structure for domain-sector text classification tasks.
This volume is a valuable reference to scholars of corpus-based studies, terminology, ICT, documentation and librarianship studies, text processing research, and distributional semantics area of interest as well as for professionals involved in Cybersecurity organizations.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover Page
- Half-Title Page
- Title Page
- Copyright Page
- Contents
- List of Figures
- List of Tables
- Foreword
- Preface
- 1 Background
- 2 Case study: Cybersecurity domain
- 3 Related works
- 4 Research methodology
- 5 Semantic tools for Cybersecurity
- 6 Semantic enhancement and new perspectives
- 7 Conclusion
- References
- Index