Amber Baig
YOU?
Author Swipe
View article: AUTOMATING CYBER THREAT INTELLIGENCE EXTRACTION USING NATURAL LANGUAGE PROCESSING TECHNIQUES
AUTOMATING CYBER THREAT INTELLIGENCE EXTRACTION USING NATURAL LANGUAGE PROCESSING TECHNIQUES Open
The increasing negligence and complexity of online confrontations have made it abundantly clear that an organization must place a premium on real-time, ready-to-use, and expandable Cyber Threat Intelligence (CTI) strategies. The classical …
View article: Combating Digital Misinformation and Deepfakes Using Artificial Intelligence: Analyzing the Role of AI in Detection, Content Moderation, and Public Trust in the Era of Information Disorder
Combating Digital Misinformation and Deepfakes Using Artificial Intelligence: Analyzing the Role of AI in Detection, Content Moderation, and Public Trust in the Era of Information Disorder Open
Artificial intelligence (AI) functions as both a tool for addressing digital disinformation and as a source of content management disputes in our current technological age. The authors study how well AI systems work at stopping misinformat…
View article: Insights into peer-to-peer botnet dynamics: reviewing emulation testbeds and proposing a conceptual model
Insights into peer-to-peer botnet dynamics: reviewing emulation testbeds and proposing a conceptual model Open
Peer-to-peer (P2P) botnets have emerged as a resilient cybercrime tool, utilizing decentralized architectures to evade detection and complicate takedown efforts. Existing botnet emulation testbeds often fall short in replicating the dynami…
View article: The impact of consumer brand identification on the telecom business inKarachi, Pakistan
The impact of consumer brand identification on the telecom business inKarachi, Pakistan Open
Branded products are preferred by consumers for a variety of reasons. Brand recognitionamong consumers is a driving force for purchasing branded products. Representation of anindividual's decision to define themselves. Including a brand is…
View article: Learning from Peer Mistakes: Collaborative UML-Based ITS with Peer Feedback Evaluation
Learning from Peer Mistakes: Collaborative UML-Based ITS with Peer Feedback Evaluation Open
Collaborative Intelligent Tutoring Systems (ITSs) use peer tutor assessment to give feedback to students in solving problems. Through this feedback, the students reflect on their thinking and try to improve it when they get similar questio…
View article: Bootstrapping Dependency Treebank of Urdu Noisy Text
Bootstrapping Dependency Treebank of Urdu Noisy Text Open
This paper describes how bootstrapping was used to extend the development of the Urdu Noisy Text dependency treebank. To overcome the bottleneck of manually annotating corpus for a new domain of user-generated text, MaltParser, an opensour…
View article: Performance Comparison of Bootstrapped Statistical Taggers on Urdu Tweets
Performance Comparison of Bootstrapped Statistical Taggers on Urdu Tweets Open
Twitter, a social media platform has experienced substantial growth over the last few years.Thus, huge number of tweets from various communities is available and used for various NLP applications such as Opinion mining, information extract…
View article: Universal Dependencies for Urdu Noisy Text
Universal Dependencies for Urdu Noisy Text Open
In this paper, the process of creating a Dependency Treebank for tweetsin Urdu,a morphologically rich and less-resourced languageis described. The 500 Urdu tweets treebank iscreated by manually annotating the treebank withlemma, POS tags, …
View article: Sindhi Stemmer using Affix Removal Method
Sindhi Stemmer using Affix Removal Method Open
Stemming is the process of mapping various inflections of a word to its base form.Stemmer is an essential component of Information Retrieval (IR) systems and different Natural Language Processing pipelines.This research reports the develop…
View article: Towards Silver Standard Dependency Treebank of Urdu Tweets
Towards Silver Standard Dependency Treebank of Urdu Tweets Open
Manually annotated corpus is a perquisite for several natural language processing applications including parsing.Nevertheless, annotated corpus is not always available for resource-poor languages, especially when domain under consideration…
View article: Developing a POS Tagged Corpus of Urdu Tweets
Developing a POS Tagged Corpus of Urdu Tweets Open
Processing of social media text like tweets is challenging for traditional Natural Language Processing (NLP) tools developed for well-edited text due to the noisy nature of such text. However, demand for tools and resources to correctly pr…