Author of the publication

CVEjoin: An Information Security Vulnerability and Threat Intelligence Dataset.

, , and . AINA (1), volume 661 of Lecture Notes in Networks and Systems, page 380-392. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

No-PASt-BO: Normalized Portfolio Allocation Strategy for Bayesian Optimization., , , and . ICTAI, page 561-568. IEEE, (2019)Minimal Learning Machine: Theoretical Results and Clustering-Based Reference Point Selection., , , , , and . CoRR, (2019)LS-SVR as a Bayesian RBF Network., , , and . IEEE Trans. Neural Networks Learn. Syst., 31 (10): 4389-4393 (2020)OnMLM: An Online Formulation for the Minimal Learning Machine., , , , and . IWANN (1), volume 11506 of Lecture Notes in Computer Science, page 557-568. Springer, (2019)A Vulnerability Risk Assessment Methodology Using Active Learning., , and . AINA (2), volume 654 of Lecture Notes in Networks and Systems, page 171-182. Springer, (2023)Self-tuning portfolio-based Bayesian optimization., , , , and . Expert Syst. Appl., (2022)Bayesian Multilateration., , , and . IEEE Signal Process. Lett., (2022)Minimal Learning Machine for Multi-Label Learning., , , , and . CoRR, (2023)LS-SVR as a Bayesian RBF network., , , and . CoRR, (2019)Sparse minimal learning machine using a diversity measure minimization., , , , , and . ESANN, (2019)