From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A tree-based machine learning methodology to automatically classify software vulnerabilities., , , , , и . CSR, стр. 312-317. IEEE, (2021)Assessment of Vulnerability Severity using Text Mining., , и . PCI, стр. 49:1-49:6. ACM, (2017)Associating the Severity of Vulnerabilities with their Description., , и . CAiSE Workshops, том 249 из Lecture Notes in Business Information Processing, стр. 231-242. Springer, (2016)WIVSS: a new methodology for scoring information systems vulnerabilities., , и . Panhellenic Conference on Informatics, стр. 83-90. ACM, (2013)Combining Statistical and Machine Learning Techniques in IoT Anomaly Detection for Smart Homes., , , и . CAMAD, стр. 1-6. IEEE, (2019)Μέθοδοι στατιστικής και μηχανικής μάθησης στην ασφάλεια πληροφοριών. Aristotle University Of Thessaloniki, Greece, (2019)National Archive of PhD Theses: oai:10442/45101.Combining text analysis techniques with unsupervised machine learning methodologies for improved software vulnerability management., , , , и . CSR, стр. 273-278. IEEE, (2022)A RAkEL-based methodology to estimate software vulnerability characteristics & score - an application to EU project ECHO., , , , , , и . Multim. Tools Appl., 81 (7): 9459-9479 (2022)The impact of information security events to the stock market: A systematic literature review., и . Comput. Secur., (2016)Estimated Time of Arrival in Autonomous Vehicles Using Gradient Boosting: Real-life case study in public transportation., , , , и . ISC2, стр. 1-7. IEEE, (2022)