{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T19:24:43Z","timestamp":1768677883044,"version":"3.49.0"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031460760","type":"print"},{"value":"9783031460777","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-46077-7_36","type":"book-chapter","created":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T11:01:58Z","timestamp":1699268518000},"page":"494-501","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["VULDAT: Automated Vulnerability Detection from\u00a0Cyberattack Text"],"prefix":"10.1007","author":[{"given":"Refat","family":"Othman","sequence":"first","affiliation":[]},{"given":"Barbara","family":"Russo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,7]]},"reference":[{"key":"36_CR1","unstructured":"C. Research. 38% increase in 2022 global cyberattacks (2022). https:\/\/blog.checkpoint.com\/2023\/01\/05\/38-increase-in-2022-global-cyberattacks\/. Accessed 28 Apr 2023"},{"key":"36_CR2","unstructured":"NVD. NVD vulnerabilities (2021). https:\/\/nvd.nist.gov\/vuln. Accessed 2 May 2023"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Sun, N., Ding, M., Jiang, J., et al.: Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives. IEEE Commun. Surv. Tutor. (2023)","DOI":"10.1109\/COMST.2023.3273282"},{"key":"36_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109604","volume":"224","author":"T Jiang","year":"2023","unstructured":"Jiang, T., Shen, G., Guo, C., et al.: BFLS: blockchain and federated learning for sharing threat detection models as cyber threat intelligence. Comput. Netw. 224, 109604 (2023)","journal-title":"Comput. Netw."},{"issue":"6","key":"36_CR5","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/s10664-022-10179-6","volume":"27","author":"S Elder","year":"2022","unstructured":"Elder, S., Zahan, N., Shu, R., et al.: Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application. Empirical Softw. Eng. 27(6), 154 (2022)","journal-title":"Empirical Softw. Eng."},{"issue":"9","key":"36_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3556974","volume":"55","author":"J Senanayake","year":"2023","unstructured":"Senanayake, J., Kalutarage, H., Al-Kadri, M.O., et al.: Android source code vulnerability detection: a systematic literature review. ACM Comput. Surv. 55(9), 1\u201337 (2023)","journal-title":"ACM Comput. Surv."},{"issue":"9","key":"36_CR7","doi-asserted-by":"publisher","first-page":"1401","DOI":"10.3390\/electronics11091401","volume":"11","author":"G Sakellariou","year":"2022","unstructured":"Sakellariou, G., Fouliras, P., Mavridis, I., et al.: A reference model for cyber threat intelligence (CTI) systems. Electronics 11(9), 1401 (2022)","journal-title":"Electronics"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Son, S.B., Park, S., Lee, H., et al.: Introduction to MITRE ATT &CK: concepts and use cases. In: 2023 International Conference on Information Networking (ICOIN), pp. 158\u2013161. IEEE (2023)","DOI":"10.1109\/ICOIN56518.2023.10048930"},{"issue":"1","key":"36_CR9","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.eij.2022.11.001","volume":"24","author":"E Irshad","year":"2023","unstructured":"Irshad, E., Siddiqui, A.B.: Cyber threat attribution using unstructured reports in cyber threat intelligence. Egypt. Inform. J. 24(1), 43\u201359 (2023)","journal-title":"Egypt. Inform. J."},{"key":"36_CR10","unstructured":"Rahman, Md.R., Williams, L.: From threat reports to continuous threat intelligence: a comparison of attack technique extraction methods from textual artifacts. arXiv preprint. arXiv:2210.02601 (2022)"},{"key":"36_CR11","unstructured":"Rahman, Md.R., Williams, L.: An investigation of security controls and MITRE ATT &CK techniques. arXiv preprint. arXiv:2211.06500 (2022)"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Mamede, C., Pinconschi, E., Abreu, R., et al.: Exploring transformers for multi-label classification of Java vulnerabilities. In: 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS), pp. 43\u201352. IEEE (2022)","DOI":"10.1109\/QRS57517.2022.00015"},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Rahman, Md.R., Hezaveh, R.M., Williams, L.: What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: a survey. ACM Comput. Surv. 55(12), 1\u201336 (2023)","DOI":"10.1145\/3571726"},{"key":"36_CR14","unstructured":"Mendsaikhan, O., Hasegawa, H., Yamaguchi, Y., et al.: Automatic mapping of vulnerability information to adversary techniques. In: The Fourteenth International Conference on Emerging Security Information, Systems and Technologies, SECUREWARE 2020 (2020)"}],"container-title":["Lecture Notes in Computer Science","Embedded Computer Systems: Architectures, Modeling, and Simulation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-46077-7_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T11:05:35Z","timestamp":1699268735000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-46077-7_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031460760","9783031460777"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-46077-7_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"7 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAMOS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Embedded Computer Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Samos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"samos2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/samos-conference.com\/wp\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Softconf","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}