{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:00:13Z","timestamp":1743123613913,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031477140"},{"type":"electronic","value":"9783031477157"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-47715-7_51","type":"book-chapter","created":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T20:02:44Z","timestamp":1706558564000},"page":"766-781","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Prompt-Based Learning for Thread Structure Prediction in Cybersecurity Forums"],"prefix":"10.1007","author":[{"given":"Kazuaki","family":"Kashihara","sequence":"first","affiliation":[]},{"given":"Kuntal Kumar","family":"Pal","sequence":"additional","affiliation":[]},{"given":"Chitta","family":"Baral","sequence":"additional","affiliation":[]},{"given":"Robert P.","family":"Trevino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,30]]},"reference":[{"key":"51_CR1","doi-asserted-by":"crossref","unstructured":"Almukaynizi, M., Grimm, A., Nunes, E., Shakarian, J., Shakarian, P.: Predicting cyber threats through hacker social networks in darkweb and deepweb forums. In: Proceedings of the 2017 International Conference of The Computational Social Science Society of the Americas, p. 12. ACM (2017)","DOI":"10.1145\/3145574.3145590"},{"key":"51_CR2","unstructured":"Culafi, A.: Ninety percent of dark web hacking forum posts come from buyers. shorturl.at\/fEGW4 (2021). Accessed 01 Apr 2022"},{"key":"51_CR3","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL-HLT 2019, Minneapolis, MN, USA, June 2\u20137, 2019, Volume 1 (Long and Short Papers), pp. 4171\u20134186 (2019)"},{"key":"51_CR4","unstructured":"Elsner, M., Charniak, E.: You talking to me? A corpus and algorithm for conversation disentanglement. In: McKeown, K.R., Moore, J.D., Teufel, S., Allan, J., Furui, S. (eds.) ACL 2008, Proceedings of the 46th Annual Meeting of the Association for Computational Linguistics, June 15\u201320, 2008, Columbus, Ohio, USA, pp. 834\u2013842. The Association for Computer Linguistics (2008)"},{"key":"51_CR5","unstructured":"Falcon, W., Cho, K.: A framework for contrastive self-supervised learning and designing a new approach (2020). arXiv:2009.00104"},{"key":"51_CR6","unstructured":"Fox, J.: Cybersecurity statistics 2021. https:\/\/www.cobalt.io\/blog\/cybersecurity-statistics-2021 (2021). Accessed 01 Apr 2022"},{"key":"51_CR7","doi-asserted-by":"crossref","unstructured":"Fu, T., Abbasi, A., Chen, H.: Interaction coherence analysis for dark web forums. In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23\u201324, 2007, Proceedings, pp. 342\u2013349 (2007)","DOI":"10.1109\/ISI.2007.379495"},{"issue":"8","key":"51_CR8","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1145\/1978542.1978569","volume":"54","author":"S Goel","year":"2011","unstructured":"Goel, S.: Cyberwarfare: connecting the dots in cyber intelligence. Commun. ACM 54(8), 132\u2013140 (2011)","journal-title":"Commun. ACM"},{"key":"51_CR9","doi-asserted-by":"crossref","unstructured":"Halder, K., Kan, M.-Y., Sugiyama, K.: Predicting helpful posts in open-ended discussion forums: A neural architecture. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL-HLT 2019, Minneapolis, MN, USA, June 2\u20137, 2019, Volume 1 (Long and Short Papers), pp. 3148\u20133157 (2019)","DOI":"10.18653\/v1\/N19-1318"},{"key":"51_CR10","doi-asserted-by":"crossref","unstructured":"Jiang, J.-Y., Chen, F., Chen, Y.-Y., Wang, W.: Learning to disentangle interleaved conversational threads with a siamese hierarchical network and similarity ranking. In: Walker, M.A., Ji, H., Stent, A. (eds.) Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL-HLT 2018, New Orleans, Louisiana, USA, June 1\u20136, 2018, Volume 1 (Long Papers), pp. 1812\u20131822. Association for Computational Linguistics (2018)","DOI":"10.18653\/v1\/N18-1164"},{"key":"51_CR11","doi-asserted-by":"crossref","unstructured":"Johnsen, J.W., Franke, K.: Identifying proficient cybercriminals through text and network analysis. In: IEEE International Conference on Intelligence and Security Informatics, ISI 2020, Arlington, VA, USA, November 9\u201310, 2020, pp. 1\u20137. IEEE (2020)","DOI":"10.1109\/ISI49825.2020.9280523"},{"key":"51_CR12","doi-asserted-by":"crossref","unstructured":"Kashihara, K., Shakarian, J., Baral, C.: Social structure construction from the forums using interaction coherence. In: Proceedings of the Future Technologies Conference, pp. 830\u2013843. Springer (2020)","DOI":"10.1007\/978-3-030-63092-8_55"},{"issue":"2","key":"51_CR13","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/1964897.1964917","volume":"12","author":"G L\u2019Huillier","year":"2010","unstructured":"L\u2019Huillier, G., \u00c1lvarez, H., R\u00edos, S.A., Aguilera, F.: Topic-based social network analysis for virtual communities of interests in the dark web. SIGKDD Explorations 12(2), 66\u201373 (2010)","journal-title":"SIGKDD Explorations"},{"key":"51_CR14","doi-asserted-by":"crossref","unstructured":"Marin, E., Shakarian, J., Shakarian, P.: Mining key-hackers on darkweb forums. In: 1st International Conference on Data Intelligence and Security, ICDIS 2018, South Padre Island, TX, USA, April 8\u201310, 2018, pp. 73\u201380 (2018)","DOI":"10.1109\/ICDIS.2018.00018"},{"key":"51_CR15","unstructured":"Mehri, S., Carenini, G.: Chat disentanglement: Identifying semantic reply relationships with random forests and recurrent neural networks. In: Kondrak, G., Watanabe, T. (eds.) Proceedings of the Eighth International Joint Conference on Natural Language Processing, IJCNLP 2017, Taipei, Taiwan, November 27 - December 1, 2017 - Volume 1: Long Papers, pp. 615\u2013623. Asian Federation of Natural Language Processing (2017)"},{"key":"51_CR16","doi-asserted-by":"crossref","unstructured":"Mishra, S., Khashabi, D., Baral, C., Choi, Y., Hajishirzi, H.: Reframing instructional prompts to GPTK\u2019s language (2021). CoRR. arXiv:2109.07830","DOI":"10.18653\/v1\/2022.findings-acl.50"},{"key":"51_CR17","unstructured":"Mishra, S., Khashabi, D., Baral, C., Hajishirzi, H.: Natural instructions: Benchmarking generalization to new tasks from natural language instructions (2021). CoRR. arXiv:2104.08773"},{"key":"51_CR18","unstructured":"Morgan, S.: Hackerpocalypse cybercrime report 2016. https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/ (2016). Accessed 01 Apr 2022"},{"key":"51_CR19","unstructured":"Paszke, A., Gross, S., Chintala, S., Chanan, G., Yang, E., DeVito, Z., Lin, Z., Antiga, L., Lerer, A.: Automatic differentiation in pytorch. In: NIPS-W, Alban Desmaison (2017)"},{"key":"51_CR20","doi-asserted-by":"crossref","unstructured":"Pete, I., Hughes, J., Chua, Y.T., Bada, M.: A social network analysis and comparison of six dark web forums. In: IEEE European Symposium on Security and Privacy Workshops, EuroS &P Workshops 2020, Genoa, Italy, September 7\u201311, 2020, pp. 484\u2013493. IEEE (2020)","DOI":"10.1109\/EuroSPW51379.2020.00071"},{"key":"51_CR21","unstructured":"Phillips, E., Nurse, J.R.C., Goldsmith, M., Creese, S.: Extracting social structure from darkweb forums (2015)"},{"key":"51_CR22","doi-asserted-by":"crossref","unstructured":"Reynolds, L., McDonell, K.: Prompt programming for large language models: Beyond the few-shot paradigm. In: Kitamura, Y., Quigley, A., Isbister, K., Igarashi, T. (eds.) CHI \u201921: CHI Conference on Human Factors in Computing Systems, Virtual Event \/ Yokohama Japan, May 8\u201313, 2021, Extended Abstracts, pp. 314:1\u2013314:7. ACM (2021)","DOI":"10.1145\/3411763.3451760"},{"key":"51_CR23","unstructured":"Sarkar, S., Almukaynizi, M., Shakarian, J., Shakarian, P.: Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums. In: 2018 International Conference on Cyber Conflict, CyCon U.S. 2018, Washington, DC, USA, November 14\u201315, 2018, pp. 1\u20137 (2018)"},{"key":"51_CR24","doi-asserted-by":"crossref","unstructured":"Le Scao, T., Rush, A.M.: How many data points is a prompt worth? In: Toutanova, K., Rumshisky, A., Zettlemoyer, L., Hakkani-T\u00fcr, D., Beltagy, I., Bethard, S., Cotterell, R., Chakraborty, T., Zhou, Y. (eds.) Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL-HLT 2021, Online, June 6\u201311, 2021, pp. 2627\u20132636. Association for Computational Linguistics (2021)","DOI":"10.18653\/v1\/2021.naacl-main.208"},{"key":"51_CR25","doi-asserted-by":"crossref","unstructured":"Schick, T., Sch\u00fctze, H.: Few-shot text generation with natural language instructions. In: Moens, M.-F., Huang, X., Specia, L., Yih, S.W.-T. (eds.) Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, EMNLP 2021, Virtual Event \/ Punta Cana, Dominican Republic, 7\u201311 November, 2021, pp. 390\u2013402. Association for Computational Linguistics (2021)","DOI":"10.18653\/v1\/2021.emnlp-main.32"},{"key":"51_CR26","doi-asserted-by":"crossref","unstructured":"Tam, D., Menon, R.R., Bansal, M., Srivastava, S., Raffel, C.: Improving and simplifying pattern exploiting training. In: Moens, M.-F., Huang, X., Specia, L., Yih, S.W.-T. (eds.) Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, EMNLP 2021, Virtual Event \/ Punta Cana, Dominican Republic, 7\u201311 November, 2021, pp. 4980\u20134991. Association for Computational Linguistics (2021)","DOI":"10.18653\/v1\/2021.emnlp-main.407"},{"key":"51_CR27","unstructured":"Positive Technologies. Custom hacking services. https:\/\/www.ptsecurity.com\/ww-en\/analytics\/custom-hacking-services\/ (2021). Accessed 01 Apr 2022"},{"key":"51_CR28","doi-asserted-by":"crossref","unstructured":"Wolf, T., Debut, L., Sanh, V., Chaumond, J., Delangue, C., Moi, A., Cistac, P., Rault, T., Louf, R., Funtowicz, M., Davison, J., Shleifer, S., von Platen, P., Ma, C., Jernite, Y., Plu, J., Xu, C., Le Scao, T., Gugger, S., Drame, M., Lhoest, Q., Rush, A.M.: Transformers: State-of-the-art natural language processing. In: Liu, Q., Schlangen, D. (eds.) Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, EMNLP 2020\u2014Demos, Online, November 16\u201320, 2020, pp. 38\u201345. Association for Computational Linguistics (2020)","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"51_CR29","doi-asserted-by":"crossref","unstructured":"Yu, T., Joty, S.R.: Online conversation disentanglement with pointer networks. In: Webber, B., Cohn, T., He, Y., Liu, Y. (eds.) Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, EMNLP 2020, Online, November 16\u201320, 2020, pp. 6321\u20136330. Association for Computational Linguistics (2020)","DOI":"10.18653\/v1\/2020.emnlp-main.512"},{"key":"51_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, P., Qi, Y., Li, Y., Ya, J., Wang, X., Liu, T., Shi, J.: Identifying reply relationships from telegram groups using multi-features fusion. In: 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC), pp. 321\u2013327. IEEE (2021)","DOI":"10.1109\/DSC53577.2021.00051"},{"key":"51_CR31","doi-asserted-by":"crossref","unstructured":"Zhu, H., Nan, F., Wang, Z., Nallapati, R., Xiang, B.: Who did they respond to? conversation structure modeling using masked hierarchical transformer. In: The Thirty-Fourth AAAI Conference on Artificial Intelligence, AAAI 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, IAAI 2020, The Tenth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2020, New York, NY, USA, February 7\u201312, 2020, pp. 9741\u20139748. AAAI Press (2020)","DOI":"10.1609\/aaai.v34i05.6524"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47715-7_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T20:09:20Z","timestamp":1706558960000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47715-7_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031477140","9783031477157"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47715-7_51","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"30 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys12023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}