Funder
Horizon 2020 Framework Programme
Horizon 2020
Subject
Artificial Intelligence,Information Systems and Management,Management Information Systems,Software
Reference76 articles.
1. Summarizing vulnerabilities’ descriptions to support experts during vulnerability assessment activities;Russo;J. Syst. Softw.,2019
2. Information extraction of cybersecurity concepts: An LSTM approach;Gasmi;Appl. Sci.,2019
3. C.L. Jones, R.A. Bridges, K.M. Huffer, J.R. Goodall, Towards a relation extraction framework for cyber-security concepts, in: Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015, pp. 1–4.
4. A survey on named entity recognition solutions applied for cybersecurity-related text processing;Georgescu,2021
5. R.A. Bridges, C.L. Jones, M.D. Iannacone, K.M. Testa, J.R. Goodall, Automatic labeling for entity extraction in cyber security, URL https://www.osti.gov/biblio/1143555.
Cited by
50 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献