Keisuke Furumoto

Orcid: 0000-0002-0699-5884

According to our database1, Keisuke Furumoto authored at least 11 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Model Selection for Continuous Operation of Automated Vulnerability Assessment System.
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, 2023

2022
Multi-labeling with topic models for searching security information.
Ann. des Télécommunications, 2022

2021
Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time.
IEICE Trans. Inf. Syst., 2021

Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

Extracting Threat Intelligence Related IoT Botnet From Latest Dark Web Data Collection.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

2020
Paragraph-based Estimation of Cyber Kill Chain Phase from Threat Intelligence Reports.
J. Inf. Process., 2020

Toward Automated Smart Ships: Designing Effective Cyber Risk Management.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

2019
Understanding Attack Trends from Security Blog Posts Using Guided-topic Model.
J. Inf. Process., 2019

Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description.
IEICE Trans. Inf. Syst., 2019

2018
Recognition Accuracy Improvement of Obfuscated QR Code by Using Reliability Information and GMD Decoding.
J. Inf. Process., 2018

2017
Analysis of Multiple Darknet Focusing on Outbound Packets and its Application to Malware Analysis.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017


  Loading...