Amanote Research

Amanote Research

    RegisterSign In

Discover open access scientific publications

Search, annotate, share and cite publications


Publications by Masami Mohri

Understanding Attack Trends From Security Blog Posts Using Guided-Topic Model

Journal of Information Processing
2019English

Related publications

Security of Tenure in Public Posts

BMJ
1930English

Mining Known Attack Patterns From Security-Related Events

PeerJ Computer Science
Computer Science
2015English

Security Enhancment on LEACH Protocol From HELLO Flood Attack in WSN Using LDK Scheme

International Journal of Innovative Research in Science, Engineering and Technology
2015English

Document Stream Evaluation Using a Sub-Topic Model

Journal of Japan Society for Fuzzy Theory and Intelligent Informatics
2006English

MP28: A Randomized Comparative Trial of the Usage, Knowledge Retention and Media Preferences in Undergraduate Medical Students Using Podcasts and Blog Posts

Canadian Journal of Emergency Medicine
Emergency Medicine
2017English

Understanding Business Trends From Data Evolution With Tornado

2015English

Topic Maps Constraint Languages: Understanding and Comparing

International Journal of Reasoning-based Intelligent Systems
EngineeringComputer Science
2009English

Revisiting Cloud Security Threats: Repudiation Attack

International Journal of Recent Technology and Engineering
EngineeringManagement of TechnologyInnovation
2020English

Hidden Topic Sentiment Model

2016English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy