Abstract
No abstract available.
Cited By
-
Bishop S, Isaacs J and Isaacs J (2014). Representational learning for sonar ATR SPIE Defense + Security, 10.1117/12.2053057, , (907203), Online publication date: 9-Jun-2014.
-
Shen C (2014). Strategic vendor selection criteria discussed in relation to demand and supply perspectives, Journal of Industrial and Production Engineering, 10.1080/21681015.2014.975161, 31:7, (405-416), Online publication date: 3-Oct-2014.
-
Kanakogi K, Washizaki H, Fukazawa Y, Ogata S, Okubo T, Kato T, Kanuka H, Hazeyama A and Yoshioka N (2021). Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques, Information, 10.3390/info12080298, 12:8, (298)
-
Kanakogi K, Washizaki H, Fukazawa Y, Ogata S, Okubo T, Kato T, Kanuka H, Hazeyama A and Yoshioka N (2022). Comparative Evaluation of NLP-Based Approaches for Linking CAPEC Attack Patterns from CVE Vulnerability Information, Applied Sciences, 10.3390/app12073400, 12:7, (3400)
Index Terms
- Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval
Recommendations
Acceptance Rates
SIGIR '99 Paper Acceptance Rate 33 of 135 submissions, 24%;
Overall Acceptance Rate 792 of 3,983 submissions, 20%