Author of the publication

CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs.

, , , and . IWSEC, volume 13504 of Lecture Notes in Computer Science, page 85-104. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android., , , and . J. Internet Serv. Inf. Secur., 4 (2): 55-69 (2014)Prevention of Kernel Memory Corruption Using Kernel Page Restriction Mechanism., and . J. Inf. Process., (2022)Editor's Message to Special Issue of Computer Security Technologies against Sophisticated Cyber Attacks.. J. Inf. Process., (2017)Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism., and . IEEE Access, (2021)VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss., and . ARES, volume 6908 of Lecture Notes in Computer Science, page 176-190. Springer, (2011)KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism., and . ISPEC, volume 11879 of Lecture Notes in Computer Science, page 75-94. Springer, (2019)Protection Mechanism of Kernel Data Using Memory Protection Key., and . IEICE Trans. Inf. Syst., 106 (9): 1326-1338 (September 2023)Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites., , and . CANDAR (Workshops), page 328-333. IEEE, (2020)Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services., , and . CANDAR, page 635-641. IEEE Computer Society, (2016)Design and implementation of hiding method for file manipulation of essential services by system call proxy using virtual machine monitor., , and . Int. J. Space Based Situated Comput., 9 (1): 1-10 (2019)