default search action
Alain Mermoud
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c12]Ljiljana Dolamic, Julian Jang-Jaccard, Alain Mermoud, Vincent Lenders:
Automated Identification of Emerging Technologies: Open Data Approach. EEKE/AII@iConference 2024: 24-33 - [c11]Alexander Sternfeld, Andrei Kucharavy, Dimitri Percia David, Alain Mermoud, Julian Jang-Jaccard:
LLM-Resilient Bibliometrics: Factual Consistency Through Entity Triplet Extraction. EEKE/AII@iConference 2024: 85-93 - [c10]Natalia Ostapuk, Ljiljana Dolamic, Alain Mermoud, Philippe Cudré-Mauroux:
Leveraging Pre-Trained Extreme Multi-Label Classifiers for Zero-Shot Learning. SDS 2024: 233-236 - [c9]Natalia Ostapuk, Julien Audiffren, Ljiljana Dolamic, Alain Mermoud, Philippe Cudré-Mauroux:
Follow the Path: Hierarchy-Aware Extreme Multi-Label Completion for Semantic Text Tagging. WWW 2024: 2094-2105 - [i17]Alessandro Tavazzi, Dimitri Percia David, Julian Jang-Jaccard, Alain Mermoud:
Measuring Technological Convergence in Encryption Technologies with Proximity Indices: A Text Mining and Bibliometric Analysis using OpenAlex. CoRR abs/2403.01601 (2024) - 2023
- [j4]Sébastien Gillard, Dimitri Percia David, Alain Mermoud, Thomas Maillart:
Efficient collective action for tackling time-critical cybersecurity threats. J. Cybersecur. 9(1) (2023) - [j3]Zhivar Sourati, Vishnu Priya Prasanna Venkatesh, Darshan Deshpande, Himanshu Rawlani, Filip Ilievski, Hông-Ân Sandlin, Alain Mermoud:
Robust and explainable identification of logical fallacies in natural language arguments. Knowl. Based Syst. 266: 110418 (2023) - [c8]Gerrit Holtrup, William Blonay, Martin Strohmeier, Alain Mermoud, Jean-Pascal Chavanne, Vincent Lenders:
Modeling 5G Threat Scenarios for Critical Infrastructure Protection. CyCon 2023: 161-180 - [c7]Maxime Würsch, Andrei Kucharavy, Dimitri Percia David, Alain Mermoud:
LLM-Based Entity Extraction Is Not for Cybersecurity. EEKE/AII@JCDL 2023: 26-32 - [c6]Zhivar Sourati, Filip Ilievski, Hông-Ân Sandlin, Alain Mermoud:
Case-Based Reasoning with Language Models for Classification of Logical Fallacies. IJCAI 2023: 5188-5196 - [c5]Abhinav Kumar Thakur, Filip Ilievski, Hông-Ân Sandlin, Zhivar Sourati, Luca Luceri, Riccardo Tommasini, Alain Mermoud:
Explainable Classification of Internet Memes. NeSy 2023: 395-409 - [i16]Zhivar Sourati, Filip Ilievski, Hông-Ân Sandlin, Alain Mermoud:
Case-Based Reasoning with Language Models for Classification of Logical Fallacies. CoRR abs/2301.11879 (2023) - [i15]Andrei Kucharavy, Zachary Schillaci, Loïc Maréchal, Maxime Würsch, Ljiljana Dolamic, Remi Sabonnadiere, Dimitri Percia David, Alain Mermoud, Vincent Lenders:
Fundamentals of Generative Large Language Models and Perspectives in Cyber-Defense. CoRR abs/2303.12132 (2023) - [i14]Maxime Würsch, Andrei Kucharavy, Dimitri Percia David, Alain Mermoud:
LLMs Perform Poorly at Concept Extraction in Cyber-security Research Literature. CoRR abs/2312.07110 (2023) - 2022
- [c4]Eric Jollès, Sébastien Gillard, Dimitri Percia David, Martin Strohmeier, Alain Mermoud:
Building Collaborative Cybersecurity for Critical Infrastructure Protection: Empirical Evidence of Collective Intelligence Information Sharing Dynamics on ThreatFox. CRITIS 2022: 140-157 - [i13]Sébastien Gillard, Dimitri Percia David, Alain Mermoud, Thomas Maillart:
Efficient Collective Action for Tackling Time-Critical Cybersecurity Threats. CoRR abs/2206.15055 (2022) - [i12]Juan Ramón Troncoso-Pastoriza, Alain Mermoud, Romain Bouyé, Francesco Marino, Jean-Philippe Bossuat, Vincent Lenders, Jean-Pierre Hubaux:
Orchestrating Collaborative Cybersecurity: A Secure Framework for Distributed Privacy-Preserving Threat Intelligence Sharing. CoRR abs/2209.02676 (2022) - [i11]Michael Tsesmelis, Ljiljana Dolamic, Marcus Matthias Keupp, Dimitri Percia David, Alain Mermoud:
Identifying Emerging Technologies and Leading Companies using Network Dynamics of Patent Clusters: a Cybersecurity Case Study. CoRR abs/2209.10224 (2022) - [i10]Alexander Glavackij, Dimitri Percia David, Alain Mermoud, Angelika Romanou, Karl Aberer:
Beyond S-curves: Recurrent Neural Networks for Technology Forecasting. CoRR abs/2211.15334 (2022) - [i9]Abhinav Kumar Thakur, Filip Ilievski, Hông-Ân Sandlin, Alain Mermoud, Zhivar Sourati, Luca Luceri, Riccardo Tommasini:
Multimodal and Explainable Internet Meme Classification. CoRR abs/2212.05612 (2022) - [i8]Aravinda Kolla, Filip Ilievski, Hông-Ân Sandlin, Alain Mermoud:
A Study of Slang Representation Methods. CoRR abs/2212.05613 (2022) - [i7]Zhivar Sourati, Vishnu Priya Prasanna Venkatesh, Darshan Deshpande, Himanshu Rawlani, Filip Ilievski, Hông-Ân Sandlin, Alain Mermoud:
Robust and Explainable Identification of Logical Fallacies in Natural Language Arguments. CoRR abs/2212.07425 (2022) - 2021
- [e1]Dimitri Percia David, Alain Mermoud, Thomas Maillart:
Critical Information Infrastructures Security - 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27-29, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13139, Springer 2021, ISBN 978-3-030-93199-5 [contents] - [i6]Luca Gambazzi, Patrick Schaller, Alain Mermoud, Vincent Lenders:
Blockchain in Cyberdefence: A Technology Review from a Swiss Perspective. CoRR abs/2103.02606 (2021) - [i5]Gerrit Holtrup, William Lacube, Dimitri Percia David, Alain Mermoud, Gérôme Bovet, Vincent Lenders:
5G System Security Analysis. CoRR abs/2108.08700 (2021) - [i4]Dimitri Percia David, Alain Mermoud, Sébastien Gillard:
Cyber-Security Investment in the Context of Disruptive Technologies: Extension of the Gordon-Loeb Model. CoRR abs/2112.04310 (2021) - [i3]Chi Thang Duong, Dimitri Percia David, Ljiljana Dolamic, Alain Mermoud, Vincent Lenders, Karl Aberer:
From Scattered Sources to Comprehensive Technology Landscape: A Recommendation-based Retrieval Approach. CoRR abs/2112.04810 (2021) - [i2]Anita Mezzetti, Dimitri Percia David, Thomas Maillart, Michael Tsesmelis, Alain Mermoud:
TechRank: A Network-Centrality Approach for Informed Cybersecurity-Investment. CoRR abs/2112.05548 (2021) - 2020
- [j2]Dimitri Percia David, Marcus Matthias Keupp, Alain Mermoud:
Knowledge absorption for cyber-security: The role of human beliefs. Comput. Hum. Behav. 106: 106255 (2020) - [i1]Franck Legendre, Mathias Humbert, Alain Mermoud, Vincent Lenders:
Contact Tracing: An Overview of Technologies and Cyber Risks. CoRR abs/2007.02806 (2020)
2010 – 2019
- 2019
- [j1]Alain Mermoud, Marcus Matthias Keupp, Kévin Huguenin, Maximilian Palmié, Dimitri Percia David:
To share or not to share: a behavioral perspective on human participation in security information sharing. J. Cybersecur. 5(1): tyz006 (2019) - 2018
- [c3]Alain Mermoud, Marcus Matthias Keupp, Dimitri Percia David:
Governance Models Preferences for Security Information Sharing: An Institutional Economics Perspective for Critical Infrastructure Protection. CRITIS 2018: 179-190 - 2016
- [c2]Alain Mermoud, Marcus Matthias Keupp, Solange Ghernaouti, Dimitri Percia David:
Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection. CRITIS 2016: 150-162 - [c1]Dimitri Percia David, Marcus Matthias Keupp, Solange Ghernaouti, Alain Mermoud:
Cyber Security Investment in the Context of Disruptive Technologies: Extension of the Gordon-Loeb Model and Application to Critical Infrastructure Protection. CRITIS 2016: 296-301
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint