Automatic extraction of named entities of cyber threats using a deep Bi-LSTM-CRF network

Gyeongmin Kim, Chanhee Lee, Jaechoon Jo, Heuiseok Lim

Research output: Contribution to journalArticlepeer-review

5 Citations (Scopus)

Fingerprint

Dive into the research topics of 'Automatic extraction of named entities of cyber threats using a deep Bi-LSTM-CRF network'. Together they form a unique fingerprint.

Engineering & Materials Science