Alain Mermoud

Orcid: 0000-0001-6471-772X

According to our database1, Alain Mermoud authored at least 30 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Measuring Technological Convergence in Encryption Technologies with Proximity Indices: A Text Mining and Bibliometric Analysis using OpenAlex.
CoRR, 2024

Follow the Path: Hierarchy-Aware Extreme Multi-Label Completion for Semantic Text Tagging.
Proceedings of the ACM on Web Conference 2024, 2024

Leveraging Pre-Trained Extreme Multi-Label Classifiers for Zero-Shot Learning.
Proceedings of the 11th IEEE Swiss Conference on Data Science, 2024

LLM-Resilient Bibliometrics: Factual Consistency Through Entity Triplet Extraction.
Proceedings of Joint Workshop of the 5th Extraction and Evaluation of Knowledge Entities from Scientific Documents (EEKE2024) and the 4th AI + Informetrics (AII2024) co-located with the ( iConference2024), 2024

Automated Identification of Emerging Technologies: Open Data Approach.
Proceedings of Joint Workshop of the 5th Extraction and Evaluation of Knowledge Entities from Scientific Documents (EEKE2024) and the 4th AI + Informetrics (AII2024) co-located with the ( iConference2024), 2024

2023
Robust and explainable identification of logical fallacies in natural language arguments.
Knowl. Based Syst., April, 2023

Efficient collective action for tackling time-critical cybersecurity threats.
J. Cybersecur., January, 2023

LLMs Perform Poorly at Concept Extraction in Cyber-security Research Literature.
CoRR, 2023

Fundamentals of Generative Large Language Models and Perspectives in Cyber-Defense.
CoRR, 2023

Explainable Classification of Internet Memes.
Proceedings of the 17th International Workshop on Neural-Symbolic Learning and Reasoning, 2023

Case-Based Reasoning with Language Models for Classification of Logical Fallacies.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

LLM-Based Entity Extraction Is Not for Cybersecurity.
Proceedings of Joint Workshop of the 4th Extraction and Evaluation of Knowledge Entities from Scientific Documents (EEKE2023) and the 3rd AI + Informetrics (AII2023) co-located with the JCDL 2023, 2023

Modeling 5G Threat Scenarios for Critical Infrastructure Protection.
Proceedings of the 15th International Conference on Cyber Conflict: Meeting Reality, 2023

2022
A Study of Slang Representation Methods.
CoRR, 2022

Multimodal and Explainable Internet Meme Classification.
CoRR, 2022

Beyond S-curves: Recurrent Neural Networks for Technology Forecasting.
CoRR, 2022

Identifying Emerging Technologies and Leading Companies using Network Dynamics of Patent Clusters: a Cybersecurity Case Study.
CoRR, 2022

Orchestrating Collaborative Cybersecurity: A Secure Framework for Distributed Privacy-Preserving Threat Intelligence Sharing.
CoRR, 2022

Building Collaborative Cybersecurity for Critical Infrastructure Protection: Empirical Evidence of Collective Intelligence Information Sharing Dynamics on ThreatFox.
Proceedings of the Critical Information Infrastructures Security, 2022

2021
TechRank: A Network-Centrality Approach for Informed Cybersecurity-Investment.
CoRR, 2021

From Scattered Sources to Comprehensive Technology Landscape: A Recommendation-based Retrieval Approach.
CoRR, 2021

Cyber-Security Investment in the Context of Disruptive Technologies: Extension of the Gordon-Loeb Model.
CoRR, 2021

5G System Security Analysis.
CoRR, 2021

Blockchain in Cyberdefence: A Technology Review from a Swiss Perspective.
CoRR, 2021

2020
Contact Tracing: An Overview of Technologies and Cyber Risks.
CoRR, 2020

Knowledge absorption for cyber-security: The role of human beliefs.
Comput. Hum. Behav., 2020

2019
To share or not to share: a behavioral perspective on human participation in security information sharing.
J. Cybersecur., 2019

2018
Governance Models Preferences for Security Information Sharing: An Institutional Economics Perspective for Critical Infrastructure Protection.
Proceedings of the Critical Information Infrastructures Security, 2018

2016
Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection.
Proceedings of the Critical Information Infrastructures Security, 2016

Cyber Security Investment in the Context of Disruptive Technologies: Extension of the Gordon-Loeb Model and Application to Critical Infrastructure Protection.
Proceedings of the Critical Information Infrastructures Security, 2016


  Loading...