Author of the publication

Discovering Message Templates on Large Scale Bitcoin Abuse Reports Using a Two-Fold NLP-Based Clustering Method.

, , , , , and . IEICE Trans. Inf. Syst., 105-D (4): 824-827 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Security-Enhanced Cloud Platform., , and . PRDC, page 229-230. IEEE, (2018)Probius: Automated Approach for VNF and Service Chain Analysis in Software-Defined NFV., , and . SOSR, page 14:1-14:13. ACM, (2018)Bridging the architectural gap between NOS design principles in software-defined networks., , , , , and . SoCC, page 637. ACM, (2017)Just-in-time WLANs: On-demand interference-managed WLAN infrastructures., , , , , and . INFOCOM, page 1-9. IEEE, (2016)Formullar: An FPGA-based network testing tool for flexible and precise measurement of ultra-low latency networking systems., , , and . Comput. Networks, (2021)FuzzDocs: An Automated Security Evaluation Framework for IoT., , , , , , and . IEEE Access, (2022)Understanding Block and Transaction Logs of Permissionless Blockchain Networks., and . Secur. Commun. Networks, (2021)Duo: Software Defined Intrusion Tolerant System Using Dual Cluster., , , , , and . Secur. Commun. Networks, (2018)Discovering Message Templates on Large Scale Bitcoin Abuse Reports Using a Two-Fold NLP-Based Clustering Method., , , , , and . IEICE Trans. Inf. Syst., 105-D (4): 824-827 (2022)Toward Semantic Assessment of Vulnerability Severity: A Text Mining Approach., and . CIKM Workshops, volume 2482 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)