← Back to cohort

Nimra Mushtaq

FAST · 2020 · i20 - 0007
Email
Phone
LinkedIn
GitHub

Academic

Program
CGPA
Year
2020
Education
Address
DOB

Career

Current role
Target role
Skills
Text Mining, Natural Language Processing, Machine Learning, Data Visualization, KNIME

Verbatim text

The exact text the LLM saw on the page (or the booklet text from the old import). This is what powers semantic search.
Cyber Threat Intelligence with A Text Mining Approach: An 
Empirical Study of Detecting Phishing, Ransomware, and 
Emerging Threats 
Project Brief:  
Advanced cyber threats exploit business vulnerabilities like socially-engineered phishing 
attempts to compromise user credentials; encryption of businesses through ransomware 
attacks to extort payments, and impersonation of executives through business email 
compromise for fraudulent wire transfers. This empirical research will utilize text mining 
techniques to detect cyber threats and generate intelligence from textual data.  
Research objectives: 
 
Identify relevant text sources related to phishing, ransom ware, business email 
compromise, and other cyber threats facing businesses. 
 
Develop text mining techniques to detect threats and extract indicators from text 
sources. 
 
Evaluate combinations of natural language processing, machine learning, and data 
visualization methods for generating actionable cyber threat intelligence. 
Methodology:  
This methodology can be expected to facilitate an empirical evaluation of different text 
mining techniques for cyber threat detection across various categories of threats faced by 
modern businesses. The findings may advance cyber security capabilities and inform data-
driven threat mitigation strategies. KNIME software is used for generating results. 
 
 
 
Area of Study: 
Cross Cluster 
Supervisor Name: 
Mr. Hammad Majeed 
Group Members:  
Nimra Mushtaq (i20 - 0007)

AI enrichment

Nimra Mushtaq is a student researcher focused on applying text mining and natural language processing to detect cyber threats such as phishing and ransomware. Her work involves using KNIME software to evaluate machine learning and data visualization methods for generating actionable threat intelligence.
Skills (AI)
["Cyber Threat Intelligence", "Text Mining", "Natural Language Processing", "Machine Learning", "Data Visualization", "KNIME", "Phishing Detection", "Ransomware Analysis"]
Status: ai_done
Provenance
Source file: FAST FSM Directory 2024.pdf
From job #17 page 76
Created: 1778116978