NLPExplorer
Papers
Venues
Authors
Authors Timeline
Field of Study
URLs
ACL N-gram Stats
TweeNLP
API
Team
MalwareTextDB: A Database for Annotated Malware Articles
Swee Kiat Lim
|
Aldrian Obaja Muis
|
Wei Lu
|
Chen Hui Ong
|
Paper Details:
Month: July
Year: 2017
Location: Vancouver, Canada
Venue:
ACL |
Citations
URL
SemEval-2018 Task 8: Semantic Extraction from CybersecUrity REports using Natural Language Processing (SecureNLP)
Peter Phandi
|
Amila Silva
|
Wei Lu
|
DM_NLP at SemEval-2018 Task 8: neural sequence labeling with linguistic features
Chunping Ma
|
Huafei Zheng
|
Pengjun Xie
|
Chen Li
|
Linlin Li
|
Luo Si
|
TeamDL at SemEval-2018 Task 8: Cybersecurity Text Analysis using Convolutional Neural Network and Conditional Random Fields
Manikandan R
|
Krishna Madgula
|
Snehanshu Saha
|
HCCL at SemEval-2018 Task 8: An End-to-End System for Sequence Labeling from Cybersecurity Reports
Mingming Fu
|
Xuemin Zhao
|
Yonghong Yan
|
UMBC at SemEval-2018 Task 8: Understanding Text about Malware
Ankur Padia
|
Arpita Roy
|
Taneeya Satyapanich
|
Francis Ferraro
|
Shimei Pan
|
Youngja Park
|
Anupam Joshi
|
Tim Finin
|
Villani at SemEval-2018 Task 8: Semantic Extraction from Cybersecurity Reports using Representation Learning
Pablo Loyola
|
Kugamoorthy Gajananan
|
Yuji Watanabe
|
Fumiko Satoh
|
Flytxt_NTNU at SemEval-2018 Task 8: Identifying and Classifying Malware Text Using Conditional Random Fields and Naïve Bayes Classifiers
Utpal Kumar Sikdar
|
Biswanath Barik
|
Björn Gambäck
|
Digital Operatives at SemEval-2018 Task 8: Using dependency features for malware NLP
Chris Brew
|
https://doi.org/10.18653/v1/P17-1143
https://doi.org/10.18653/v1/P17-1143
https://cuckoosandbox.org/
http://statnlp.org/research/re/
https://doi.org/10.1109/CTC.2010.8
https://doi.org/10.1007/978-3-319-26362-5
https://github.com/
http://dl.acm.org/citation.cfm?id=176313.176316
http://dl.acm.org/citation.cfm?id=2028067.2028073
https://doi.org/10.1177/001316446002000104
http://www.symantec.com/content/en/us/
https://www.cylance.com/hubfs/
http://dl.acm.org/citation.cfm?id=1859664.1859668
https://taku910.github.io/
http://dl.acm.org/citation.cfm?id=655813
https://doi.org/10.1109/MSP.2011.67
https://doi.org/1721.1/33296
https://doi.org/10.1016/j.diin.2006.08.010
http://www.nsrl.nist.gov/
https://www.owasp.org/index.php/OWASP_File_
http://dl.acm.org/citation.cfm?id=2078195
https://doi.org/10.1109/TrustCom.2013.36
https://doi.org/10.3233/JCS-2010-0410
https://doi.org/10.3115/977035.977059
http://dl.acm.org/citation.cfm?id=2380921.2380942
https://openai.com/blog/special-projects/
https://openai.com/blog/special-projects/
https://doi.org/10.3115/1073445.1073478
https://www.us-cert.gov/ncas/alerts/TA16-
https://doi.org/10.1109/MSP.2007.45
Field Of Study
Task
Tagging
Chunking
Approach
Semi-supervised Learning
Similar Papers
Modeling Speech Acts in Asynchronous Conversations: A Neural-CRF Approach
Shafiq Joty
|
Tasnim Mohiuddin
|
Who cares about Sarcastic Tweets? Investigating the Impact of Sarcasm on Sentiment Analysis.
Diana Maynard
|
Mark Greenwood
|
Indicative Tweet Generation: An Extractive Summarization Problem?
Priya Sidhaye
|
Jackie Chi Kit Cheung
|
TwitIE: An Open-Source Information Extraction Pipeline for Microblog Text
Kalina Bontcheva
|
Leon Derczynski
|
Adam Funk
|
Mark Greenwood
|
Diana Maynard
|
Niraj Aswani
|
Argumentation Mining in User-Generated Web Discourse
Ivan Habernal
|
Iryna Gurevych
|