1 code implementation • NAACL 2019 • Shi Zong, Alan Ritter, Graham Mueller, Evan Wright
In this paper, we investigate methods to analyze the severity of cybersecurity threats based on the language that is used to describe them online.