Author of the publication

Multi-labeling with topic models for searching security information.

, , , , , , , and . Ann. des Télécommunications, 77 (11-12): 777-788 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?, , , , , , , , , and . PerCom Workshops, page 376-379. IEEE, (2021)Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time., , , , , , , and . IEICE Trans. Inf. Syst., 104-D (5): 556-561 (2021)Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description., , , , , , , , , and . IEICE Trans. Inf. Syst., 102-D (9): 1679-1682 (2019)Toward Automated Smart Ships: Designing Effective Cyber Risk Management., , , , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 100-105. IEEE, (2020)Model Selection for Continuous Operation of Automated Vulnerability Assessment System., , , and . ARTMAN@CCS, page 11-15. ACM, (2023)Understanding Attack Trends from Security Blog Posts Using Guided-topic Model., , , , , , , and . J. Inf. Process., (2019)Extracting Threat Intelligence Related IoT Botnet From Latest Dark Web Data Collection., , , , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 138-145. IEEE, (2021)Recognition Accuracy Improvement of Obfuscated QR Code by Using Reliability Information and GMD Decoding., and . J. Inf. Process., (2018)Paragraph-based Estimation of Cyber Kill Chain Phase from Threat Intelligence Reports., , , , , , , and . J. Inf. Process., (2020)Multi-labeling with topic models for searching security information., , , , , , , and . Ann. des Télécommunications, 77 (11-12): 777-788 (2022)