Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/icmla/BridgesHJIG17
%A Bridges, Robert A.
%A Huffer, Kelly M. T.
%A Jones, Corinne L.
%A Iannacone, Michael D.
%A Goodall, John R.
%B ICMLA
%D 2017
%E Chen, Xuewen
%E Luo, Bo
%E Luo, Feng
%E Palade, Vasile
%E Wani, M. Arif
%I IEEE
%K dblp
%P 437-442
%T Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors.
%U http://dblp.uni-trier.de/db/conf/icmla/icmla2017.html#BridgesHJIG17
%@ 978-1-5386-1418-1
@inproceedings{conf/icmla/BridgesHJIG17,
added-at = {2018-01-23T00:00:00.000+0100},
author = {Bridges, Robert A. and Huffer, Kelly M. T. and Jones, Corinne L. and Iannacone, Michael D. and Goodall, John R.},
biburl = {https://www.bibsonomy.org/bibtex/2854d0b16785c1982cf75f9eb5f43e674/dblp},
booktitle = {ICMLA},
crossref = {conf/icmla/2017},
editor = {Chen, Xuewen and Luo, Bo and Luo, Feng and Palade, Vasile and Wani, M. Arif},
ee = {https://doi.org/10.1109/ICMLA.2017.0-122},
interhash = {0b191b5a2b421d3b3298c552bd3943ed},
intrahash = {854d0b16785c1982cf75f9eb5f43e674},
isbn = {978-1-5386-1418-1},
keywords = {dblp},
pages = {437-442},
publisher = {IEEE},
timestamp = {2019-10-17T13:56:08.000+0200},
title = {Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors.},
url = {http://dblp.uni-trier.de/db/conf/icmla/icmla2017.html#BridgesHJIG17},
year = 2017
}