2018 International Symposium on Electronics and Telecommunications (ISETC) 2018
DOI: 10.1109/isetc.2018.8584007
|View full text |Cite
|
Sign up to set email alerts
|

A Character Prediction Approach in a Security Context using a Recurrent Neural Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
4

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Subtask 2 is related to many NLP tasks that can be formalized as a sequence labeling problem, such as part-of-speech tagging , named entity recognition (Ma and Hovy, 2016;Dumitrescu and Avram, 2019), metaphor detection (Wu et al, 2018), emphasis selection (Shirani et al, 2019), keyphrase extraction (Alzaidy et al, 2019), fragment-level propaganda detection (Da San Martino et al, 2019), complex word identification (Gooding and Kochmar, 2019), language identification (Mave et al, 2018), or cyber attacks detection in server logs (Ghimes et al, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…Subtask 2 is related to many NLP tasks that can be formalized as a sequence labeling problem, such as part-of-speech tagging , named entity recognition (Ma and Hovy, 2016;Dumitrescu and Avram, 2019), metaphor detection (Wu et al, 2018), emphasis selection (Shirani et al, 2019), keyphrase extraction (Alzaidy et al, 2019), fragment-level propaganda detection (Da San Martino et al, 2019), complex word identification (Gooding and Kochmar, 2019), language identification (Mave et al, 2018), or cyber attacks detection in server logs (Ghimes et al, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…Subtask 2 is related to many NLP tasks that can be formalized as a sequence labeling problem, such as part-of-speech tagging , named entity recognition (Ma and Hovy, 2016;Dumitrescu and Avram, 2019), metaphor detection (Wu et al, 2018), emphasis selection (Shirani et al, 2019), keyphrase extraction (Alzaidy et al, 2019), fragment-level propaganda detection (Da San Martino et al, 2019), complex word identification (Gooding and Kochmar, 2019), language identification (Mave et al, 2018), or cyber attacks detection in server logs (Ghimes et al, 2018).…”
Section: Introductionmentioning
confidence: 99%