This is a new miner, available now at http://www.minerazzi.com/
Chemistry tutorials, tools, demos, lecture notes, and more for students, teachers, and researchers. Build chemistry-specific collections. Search by topic or site.
The Intelligence, Security, and Assurance (ISA) collection is a new miner built with Minerazzi (http://www.minerazzi.com).
Use it to find resources relevant to information intelligence, security, and assurance.
Search by software tools, companies, and government agencies, or by graduate school programs offering courses on these subjects.
A new miner is available at Minerazzi.com: The Information Retrieval Collection (http://www.minerazzi.com/irc).
What you can do with it?
Use this topic-specific search engine to find information retrieval resources such as research work (articles, conference proceedings, seminal work,…) and lecture material (books, lecture notes, tutorials,…) on algorithms and models like
Singular Value Decomposition
Principal Component Analysis
Latent Dirichlet Allocation
Latent Semantic Analysis and Indexing
Vector Support Machines
Vector Space Theory and Models
Inverse Document Frequency
Markov Hidden Models
Search Engines (of course)
Some of the resources come from Nist’s TREC proceedings, AIRWeb, WICOW, Cornell’s ECommons, SIGIR, SIAM, Wikipedia, and work from top-level information retrieval researchers.
More Power to the People!
You can also use the recrawling power of Minerazzi to build your own customized collection or to enhance a third-party collection.
Over the years, I’ve been asked about the more effective way of writing peer-reviewed articles for scientific journals.
My response is always the same: Think like a referee/editor. Here is a list of items that they want to see accomplished:
Referees/editors like to see that the content and format of the title, abstract, document body, tables, images, graphics, appendices, and references follow their journal guidelines.
In general, referees/editors like to see in the first page of the printed version of an article:
1. Statement of the problem – what is the problem to be solved.
2. Purpose of the article – how the present research solves the problem.
3. Organization – how the article is organized and what is covered in each section.
This is a general practice across scientific journals. So, whenever possible, I try to accomplish 1 – 3 in the first three paragraphs of the first page of the printed article. To do this, you need to avoid lengthy introductions and wordiness. Be concise and ‘go the point’.
Referees/editors also like to see the article as a whole semantic unit. So they like to see:
Transitional statements; i.e., sections ending as an introduction to the next section.
1. One paragraph, one idea; i.e., each paragraph discussing one main idea.
2. Short paragraphs; i.e., each paragraph of about five sentences or less, where sentences are of appropriate length. This provides a natural stop to the reading. In general, short paragraphs and sentences are easier to read than the long ones. Use compound sentences with caution.
3. Facts supported by pertinent references.
4. Opinion written as opinions, not as facts.
Of course, there are other tips to think about, but in my opinion, the above can make a difference… well, in my opinion :)
Today’s Internet Engineering Part 1 course lecture will be on DNS Intelligence and how we can use DNS records to understand virus and worm attacks as well as remote network topologies. Quite handy these days.
Please check Lecture 8
If you are enrolled in the IE-Part 1 course, here is some reference material on Email Headers for today’s lecture:
Exposing email headers
Tracking the source of email spam
How to read email headers
Reading the email header
Reading email headers
Spamlinks: Reading email headers
ACCC: Reading Email Headers
E-mail Headers and SMTP Commands
All About Email Headers
Security Optimization Strategies in the Workplace
If you are a student enrolled in the Internet Engineering I graduate course, check the Lecture 7 update.
We will be covering email protocols such as SMTP, POP3, and IMAP. The exercise section covers email headers intelligence and email crawlers.
If you are a student enrolled in the Internet Engineering I graduate course, check the Lecture 6 update.
I will be covering all about DNS configuration files. For the hands-on exercise section, we will be using nslookup commands to snoop at all relevant records of remote Web domains.
Use nslookup/? to access the options helper
Use nslookup followed by ? in a different line to access the commands helper
To quit nslookup, press ctrl C or either type quit or exit.
The following are the lecture and exercise topics covered in the PUPR.edu core graduate course Internet Engineering, Part I. Students enrolled in the course might want to revisit this post as it will be updated.
History of the Internet & Search Engines
RFCs (Request for Comments)
IP (Internet Protocol)
Exercise 1 – RFCs, Network types, IP calculations
OSI Reference Model
Exercise 2 – IP-MAC Mapping, Prompt Commands (arp, ipconfig, nslookup)
Man-in-the-Middle ARP Attacks
Exercise 3 – Broadcast & Multicast IPs, Prompt Commands (netstat, ping, tracert, ipconfig, arp, nslookup)
FO Overlapping Attacks
FO Gap Attacks
Tiny FO Attacks
TCP Protocol & Buffers
Exercise 4 – TCP buffers, Congestion Windows, Advertised Windows
PING of Death
Exercise 5 – Prompt Commands (arp, ipconfig, nslookup, netstat, ping, tracert)
BIND & WINDOWS DNS (Domain Name Server)
Internet backbone root servers
DNS Configuration Errors
Forward Lookup (Zone) Files
Reverse Lookup Files
Exercise 6 – Prompt Commands (interactive/non-interactive nslookup modes)
Exercise 7 – Email Intelligence.
Using DNS records to understand Virus & Worm Attacks
Network Topology Intelligence from DNS records
Exercise 8 – DNS Intelligence
Final Exam, Oct 27
Course Grading System
8 out of 9 hands-on exercises count (worse exercise grade dropped)
1st partial exam = average of first best 4 exercise grades
2nd partial exam = average of last best 4 exercise grades
The average of these two is the same as adding up best 8 grades and dividing by 8. This result amounts to 75% of total grade (course letter grade score).
Final Exam amounts to 25 % of total grade.
After that, course letter grade is curved as shown below.
course letter grade score = (sum of best 8 exercise grades/8)*(0.75) + (final exam grade)*(0.25)
As PUPR students know by now, the AIRWeb and Internet Engineering courses have been consolidated into a single course called Internet Engineering I (IE-I), which is on Tuesday’s.
This was a decision made strictly by the administration. 12 graduate students are enrolled –a big number for a grad course. We are now in the fourth week of IE-I and I can tell that is a lot of fun.
This coming Winter semester I’m scheduled to teach a new grad course called Advanced Search Engine Architecture (ASEA). Both, IE-I and ASEA are hands-on. This means students need to get their hands and feet wet, not just learning the theory.
What we are trying to accomplish in IE-I is to understand how hackers and spammers use Internet architectures at the level of TCP/IP and Search Engines to game the system. I’ll open a special blog category for it during the week.
First lecture (Lecture 1) was briefly summarized in the August 2009 issue of IR Watch. BTW. Tonight’s lecture (Lecture 4) covers the following:
IP Protocol (MAC and IP Mapping)
ARP Hacking Attacks
ICMP Hacking Attacks
Firewall’s Fragmentation Offset Attacks
Meanwhile, ASEA is an expanded version of the previous Search Engine Architecture (SEA) course I’ve taught before. Students interested in registering, can search this blog for the SEA category and check what we have covered in the past. This will give them an idea of what to expect from the Advanced SEA course. One thing I’m planning to do different is to build an inverted index from scratch using AJAX. The most recent version of Terrier will also be used for testing/benchmarking experimentals.
Last but not least, September Issue of IRW will be a bit delayed.