Author of the publication

A tree-based machine learning methodology to automatically classify software vulnerabilities.

, , , , , and . CSR, page 312-317. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A tree-based machine learning methodology to automatically classify software vulnerabilities., , , , , and . CSR, page 312-317. IEEE, (2021)Associating the Severity of Vulnerabilities with their Description., , and . CAiSE Workshops, volume 249 of Lecture Notes in Business Information Processing, page 231-242. Springer, (2016)WIVSS: a new methodology for scoring information systems vulnerabilities., , and . Panhellenic Conference on Informatics, page 83-90. ACM, (2013)Assessment of Vulnerability Severity using Text Mining., , and . PCI, page 49:1-49:6. ACM, (2017)Combining Statistical and Machine Learning Techniques in IoT Anomaly Detection for Smart Homes., , , and . CAMAD, page 1-6. IEEE, (2019)Μέθοδοι στατιστικής και μηχανικής μάθησης στην ασφάλεια πληροφοριών. Aristotle University Of Thessaloniki, Greece, (2019)National Archive of PhD Theses: oai:10442/45101.Combining text analysis techniques with unsupervised machine learning methodologies for improved software vulnerability management., , , , and . CSR, page 273-278. IEEE, (2022)Cybersecurity Oriented Architecture to Ensure the Autonomous Vehicles Communication., , , , , and . MED, page 119-124. IEEE, (2023)EVENT: Real-time Video Feed Anomaly Detection for Enhanced Security in Autonomous Vehicles., , , , , and . MED, page 101-106. IEEE, (2023)A Lightweight Cyber-Security Defense Framework for Smart Homes., , , , , , and . INISTA, page 1-7. IEEE, (2020)