Keisuke FURUMOTO


Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time
Ryusei NAGASAWA Keisuke FURUMOTO Makoto TAKITA Yoshiaki SHIRAISHI Takeshi TAKAHASHI Masami MOHRI Yasuhiro TAKANO Masakatu MORII 
Publication:   
Publication Date: 2021/05/01
Vol. E104-D  No. 5  pp. 556-561
Type of Manuscript:  Special Section LETTER (Special Section on Data Engineering and Information Management)
Category: 
Keyword: 
topic modelcyber threat intelligencetext miningmulti-labelingsecurity blog posts
 Summary | Full Text:PDF(2.8MB)

Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description
Shunta NAKAGAWA Tatsuya NAGAI Hideaki KANEHARA Keisuke FURUMOTO Makoto TAKITA Yoshiaki SHIRAISHI Takeshi TAKAHASHI Masami MOHRI Yasuhiro TAKANO Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1679-1682
Type of Manuscript:  Special Section LETTER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: Cybersecurity
Keyword: 
CVECVSSConvolutional Neural Network
 Summary | Full Text:PDF(857.4KB)