{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:00:11Z","timestamp":1775066411155,"version":"3.50.1"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031702389","type":"print"},{"value":"9783031702396","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70239-6_24","type":"book-chapter","created":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T06:02:09Z","timestamp":1726725729000},"page":"348-363","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Relation Extraction Techniques in\u00a0Cyber Threat Intelligence"],"prefix":"10.1007","author":[{"given":"Dincy R.","family":"Arikkat","sequence":"first","affiliation":[]},{"given":"P.","family":"Vinod","sequence":"additional","affiliation":[]},{"given":"Rafidha Rehiman","family":"K. A.","sequence":"additional","affiliation":[]},{"given":"Serena","family":"Nicolazzo","sequence":"additional","affiliation":[]},{"given":"Antonino","family":"Nocera","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,20]]},"reference":[{"key":"24_CR1","doi-asserted-by":"publisher","unstructured":"Aghaei, E., Niu, X., Shadid, W., Al-Shaer, E.: SecureBERT: a domain-specific language model for cybersecurity. In: Security and Privacy in Communication Networks: 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings, pp. 39\u201356. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-25538-0_3","DOI":"10.1007\/978-3-031-25538-0_3"},{"key":"24_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103579","volume":"136","author":"K Ahmed","year":"2024","unstructured":"Ahmed, K., Khurshid, S.K., Hina, S.: CyberEntRel: joint extraction of cyber entities and relations using deep learning. Comput. Secur. 136, 103579 (2024)","journal-title":"Comput. Secur."},{"key":"24_CR3","unstructured":"Arazzi, M., Arikkat, D.R., Nicolazzo, S., Nocera, A., Conti, M., et\u00a0al.: NLP-based techniques for cyber threat intelligence. arXiv preprint arXiv:2311.08807 (2023)"},{"key":"24_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119847","volume":"222","author":"M Arazzi","year":"2023","unstructured":"Arazzi, M., Nicolazzo, S., Nocera, A., Zippo, M.: The importance of the language for the evolution of online communities: an analysis based on twitter and reddit. Expert Syst. Appl. 222, 119847 (2023)","journal-title":"Expert Syst. Appl."},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1007\/978-3-642-41033-8_84","volume-title":"On the Move to Meaningful Internet Systems: OTM 2013 Workshops","author":"F Buccafurri","year":"2013","unstructured":"Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A., Ursino, D.: Measuring betweenness centrality in social internetworking scenarios. In: Demey, Y.T., Panetto, H. (eds.) OTM 2013. LNCS, vol. 8186, pp. 666\u2013673. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41033-8_84"},{"key":"24_CR6","unstructured":"Chang, Y., et\u00a0al.: A survey on evaluation of large language models. ACM Trans. Intell. Syst. Technol. (2023)"},{"issue":"1","key":"24_CR7","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1017\/S1351324916000334","volume":"23","author":"KW Church","year":"2017","unstructured":"Church, K.W.: Word2vec. Nat. Lang. Eng. 23(1), 155\u2013162 (2017)","journal-title":"Nat. Lang. Eng."},{"key":"24_CR8","unstructured":"Dong, Y., Guo, W., Chen, Y., Xing, X., Zhang, Y., Wang, G.: Towards the detection of inconsistencies in public security vulnerability reports. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 869\u2013885 (2019)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Ebrahimi, M., Surdeanu, M., Samtani, S., Chen, H.: Detecting cyber threats in non-english dark net markets: a cross-lingual transfer learning approach. In: 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 85\u201390. IEEE (2018)","DOI":"10.1109\/ISI.2018.8587404"},{"issue":"1","key":"24_CR10","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/TR.2019.2926129","volume":"69","author":"M Fan","year":"2019","unstructured":"Fan, M., Luo, X., Liu, J., Nong, C., Zheng, Q., Liu, T.: CTDroid: leveraging a corpus of technical blogs for android malware analysis. IEEE Trans. Reliab. 69(1), 124\u2013138 (2019)","journal-title":"IEEE Trans. Reliab."},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., et al.: Revolutionizing cyber threat detection with large language models: a privacy-preserving BERT-based lightweight model for IoT\/IIoT devices. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3363469"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Gao, P., et al.: Enabling efficient cyber threat hunting with cyber threat intelligence. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), pp. 193\u2013204. IEEE (2021)","DOI":"10.1109\/ICDE51399.2021.00024"},{"key":"24_CR13","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/978-3-030-86890-1_25","volume-title":"Information and Communications Security: 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part I","author":"Y Guo","year":"2021","unstructured":"Guo, Y., et al.: CyberRel: joint entity and relation extraction for cybersecurity concepts. In: Gao, D., Li, Q., Guan, X., Liao, X. (eds.) Information and Communications Security: 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part I, pp. 447\u2013463. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86890-1_25"},{"key":"24_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103371","volume":"132","author":"Y Guo","year":"2023","unstructured":"Guo, Y., et al.: A framework for threat intelligence extraction and fusion. Comput. Secur. 132, 103371 (2023)","journal-title":"Comput. Secur."},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Happe, A., Cito, J.: Getting pwn\u2019d by AI: penetration testing with large language models. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 2082\u20132086 (2023)","DOI":"10.1145\/3611643.3613083"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Huang, C.C., et al.: Building cybersecurity ontology for understanding and reasoning adversary tactics and techniques. In: 2022 IEEE International Conference on Big Data (Big Data), pp. 4266\u20134274. IEEE (2022)","DOI":"10.1109\/BigData55660.2022.10021134"},{"issue":"2","key":"24_CR17","first-page":"776","volume":"19","author":"YT Huang","year":"2021","unstructured":"Huang, Y.T., Lin, C.Y., Guo, Y.R., Lo, K.C., Sun, Y.S., Chen, M.C.: Open source intelligence for malicious behavior discovery and interpretation. IEEE Trans. Dependable Secure Comput. 19(2), 776\u2013789 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Jones, C.L., Bridges, R.A., Huffer, K.M., Goodall, J.R.: Towards a relation extraction framework for cyber-security concepts. In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, pp.\u00a01\u20134 (2015)","DOI":"10.1145\/2746266.2746277"},{"issue":"3","key":"24_CR19","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2020.2975749","volume":"37","author":"T Li","year":"2020","unstructured":"Li, T., Sahu, A.K., Talwalkar, A., Smith, V.: Federated learning: challenges, methods, and future directions. IEEE Signal Process. Mag. 37(3), 50\u201360 (2020)","journal-title":"IEEE Signal Process. Mag."},{"key":"24_CR20","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/978-3-031-17140-6_29","volume-title":"Computer Security \u2013 ESORICS 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26\u201330, 2022, Proceedings, Part I","author":"Z Li","year":"2022","unstructured":"Li, Z., Zeng, J., Chen, Y., Liang, Z.: AttacKG: constructing technique knowledge graph from\u00a0cyber threat intelligence reports. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds.) Computer Security \u2013 ESORICS 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26\u201330, 2022, Proceedings, Part I, pp. 589\u2013609. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17140-6_29"},{"issue":"1","key":"24_CR21","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1186\/s42400-022-00110-3","volume":"5","author":"J Liu","year":"2022","unstructured":"Liu, J., et al.: TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network. Cybersecurity 5(1), 8 (2022)","journal-title":"Cybersecurity"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Lu, G., Ju, X., Chen, X., Pei, W., Cai, Z.: Grace: empowering LLM-based software vulnerability detection with graph structure and in-context learning. J. Syst. Softw., 112031 (2024)","DOI":"10.1016\/j.jss.2024.112031"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Ma, X., Wang, L., Lv, Q., Wang, Y., Zhang, Q., Jiang, J.: CyEvent2vec: attributed heterogeneous information network based event embedding framework for cyber security events analysis. In: 2022 International Joint Conference on Neural Networks (IJCNN), pp. 01\u201308. IEEE (2022)","DOI":"10.1109\/IJCNN55064.2022.9892291"},{"key":"24_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103424","volume":"134","author":"T McIntosh","year":"2023","unstructured":"McIntosh, T., et al.: Harnessing GPT-4 for generation of cybersecurity GRC policies: a focus on ransomware attack mitigation. Comput. Secur. 134, 103424 (2023)","journal-title":"Comput. Secur."},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Mfogo, V.S., Zemkoho, A., Njilla, L., Nkenlifack, M., Kamhoua, C.: AIIPot: Adaptive intelligent-interaction honeypot for IoT devices. In: 2023 IEEE 34th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp.\u00a01\u20136. IEEE (2023)","DOI":"10.1109\/PIMRC56721.2023.10293827"},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Mitra, S., Piplai, A., Mittal, S., Joshi, A.: Combating fake cyber threat intelligence using provenance in cybersecurity knowledge graphs. In: 2021 IEEE International Conference on Big Data (Big Data), pp. 3316\u20133323. IEEE (2021)","DOI":"10.1109\/BigData52589.2021.9671867"},{"key":"24_CR27","unstructured":"Mu, D., Cuevas, A., Yang, L., Hu, H., Xing, X., Mao, B., Wang, G.: Understanding the reproducibility of crowd-reported security vulnerabilities. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 919\u2013936 (2018)"},{"key":"24_CR28","doi-asserted-by":"crossref","unstructured":"Pearce, H., Tan, B., Ahmad, B., Karri, R., Dolan-Gavitt, B.: Examining zero-shot vulnerability repair with large language models. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 2339\u20132356. IEEE (2023)","DOI":"10.1109\/SP46215.2023.10179420"},{"key":"24_CR29","doi-asserted-by":"crossref","unstructured":"Perrina, F., Marchiori, F., Conti, M., Verde, N.V.: AGIR: automating cyber threat intelligence reporting with natural language generation. In: 2023 IEEE International Conference on Big Data (BigData), pp. 3053\u20133062. IEEE (2023)","DOI":"10.1109\/BigData59044.2023.10386116"},{"key":"24_CR30","doi-asserted-by":"crossref","unstructured":"Pingle, A., Piplai, A., Mittal, S., Joshi, A., Holt, J., Zak, R.: RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. In: Proceedings of the 2019 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 879\u2013886 (2019)","DOI":"10.1145\/3341161.3343519"},{"key":"24_CR31","doi-asserted-by":"crossref","unstructured":"Quattrone, G., Nicolazzo, S., Nocera, A., Quercia, D., Capra, L.: Is the sharing economy about sharing at all? A linguistic analysis of airbnb reviews. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 12, issue 1 (2018)","DOI":"10.1609\/icwsm.v12i1.15065"},{"issue":"12","key":"24_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3571726","volume":"55","author":"MR Rahman","year":"2023","unstructured":"Rahman, M.R., Hezaveh, R.M., Williams, L.: What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: a survey. ACM Comput. Surv. 55(12), 1\u201336 (2023)","journal-title":"ACM Comput. Surv."},{"key":"24_CR33","doi-asserted-by":"crossref","unstructured":"Ranade, P., Piplai, A., Joshi, A., Finin, T.: CyBERT: contextualized embeddings for the cybersecurity domain. In: 2021 IEEE International Conference on Big Data (Big Data), pp. 3334\u20133342. IEEE (2021)","DOI":"10.1109\/BigData52589.2021.9671824"},{"key":"24_CR34","doi-asserted-by":"crossref","unstructured":"Ranade, P., Piplai, A., Mittal, S., Joshi, A., Finin, T.: Generating fake cyber threat intelligence using transformer-based models. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp.\u00a01\u20139. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9534192"},{"key":"24_CR35","doi-asserted-by":"crossref","unstructured":"Sameera,\u00a0K.M., Nicolazzo, S., Arazzi, M., Nocera, A., Rafidha Rehiman,\u00a0K.A., Conti, M., et\u00a0al.: Privacy-preserving in blockchain-based federated learning systems. arXiv e-prints\u20132401 (2024)","DOI":"10.1016\/j.comcom.2024.04.024"},{"key":"24_CR36","doi-asserted-by":"crossref","unstructured":"Satvat, K., Gjomemo, R., Venkatakrishnan, V.: Extractor: extracting attack behavior from threat reports. In: 2021 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 598\u2013615. IEEE (2021)","DOI":"10.1109\/EuroSP51992.2021.00046"},{"key":"24_CR37","doi-asserted-by":"crossref","unstructured":"Satyapanich, T., Ferraro, F., Finin, T.: CASIE: extracting cybersecurity event information from text. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34(05), pp. 8749\u20138757 (2020)","DOI":"10.1609\/aaai.v34i05.6401"},{"key":"24_CR38","unstructured":"Schuster, S., Manning, C.D.: Enhanced English universal dependencies: an improved representation for natural language understanding tasks. In: Proceedings of the Tenth International Conference on Language Resources and Evaluation (LREC\u201916), pp. 2371\u20132378 (2016)"},{"key":"24_CR39","doi-asserted-by":"crossref","unstructured":"Sun, N., Ding, M., Jiang, J., Xu, W., Mo, X., Tai, Y., Zhang, J.: Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives. IEEE Commun. Surv. Tutorials (2023)","DOI":"10.1109\/COMST.2023.3273282"},{"key":"24_CR40","unstructured":"Syed, Z., Padia, A., Finin, T., Mathews, L., Joshi, A.: UCO: a unified cybersecurity ontology. In: Workshops at the Thirtieth AAAI Conference on Artificial Intelligence (2016)"},{"key":"24_CR41","doi-asserted-by":"crossref","unstructured":"V\u00f6r\u00f6s, T., Bergeron, S.P., Berlin, K.: Web content filtering through knowledge distillation of large language models. In: 2023 IEEE International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT), pp. 357\u2013361. IEEE (2023)","DOI":"10.1109\/WI-IAT59888.2023.00058"},{"key":"24_CR42","doi-asserted-by":"crossref","unstructured":"Wang, X., Xiong, M., Luo, Y., Li, N., Jiang, Z., Xiong, Z.: Joint learning for document-level threat intelligence relation extraction and coreference resolution based on GCN. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 584\u2013591. IEEE (2020)","DOI":"10.1109\/TrustCom50675.2020.00083"},{"key":"24_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107178","volume":"158","author":"Y Wei","year":"2023","unstructured":"Wei, Y., Bo, L., Sun, X., Li, B., Zhang, T., Tao, C.: Automated event extraction of CVE descriptions. Inf. Softw. Technol. 158, 107178 (2023)","journal-title":"Inf. Softw. Technol."},{"key":"24_CR44","doi-asserted-by":"crossref","unstructured":"Yang, J., et al.: Harnessing the power of LLMs in practice: a survey on ChatGPT and beyond. ACM Trans. Knowl. Discov. Data (2023)","DOI":"10.1145\/3649506"},{"key":"24_CR45","doi-asserted-by":"crossref","unstructured":"Yitagesu, S., Xing, Z., Zhang, X., Feng, Z., Li, X., Han, L.: Unsupervised labeling and extraction of phrase-based concepts in vulnerability descriptions. In: 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 943\u2013954. IEEE (2021)","DOI":"10.1109\/ASE51524.2021.9678638"},{"issue":"5","key":"24_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3579638","volume":"32","author":"S Yitagesu","year":"2023","unstructured":"Yitagesu, S., Xing, Z., Zhang, X., Feng, Z., Li, X., Han, L.: Extraction of phrase-based concepts in vulnerability descriptions through unsupervised labeling. ACM Trans. Softw. Eng. Methodol. 32(5), 1\u201345 (2023)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"24_CR47","doi-asserted-by":"publisher","unstructured":"Yu, F., Martin, M.V.: Honey, i chunked the passwords: generating semantic honeywords resistant to targeted attacks using pre-trained language models. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 89\u2013108. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-35504-2_5","DOI":"10.1007\/978-3-031-35504-2_5"},{"key":"24_CR48","doi-asserted-by":"crossref","unstructured":"Yu, L., Lu, J., Liu, X., Yang, L., Zhang, F., Ma, J.: PSCVFinder: a prompt-tuning based framework for smart contract vulnerability detection. In: 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE), pp. 556\u2013567. IEEE (2023)","DOI":"10.1109\/ISSRE59848.2023.00030"},{"key":"24_CR49","unstructured":"Zeng, D., Liu, K., Lai, S., Zhou, G., Zhao, J.: Relation classification via convolutional deep neural network. In: Proceedings of COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers, pp. 2335\u20132344 (2014)"},{"key":"24_CR50","unstructured":"Zhang, D., Wang, D.: Relation classification via recurrent neural network. arXiv preprint arXiv:1508.01006 (2015)"},{"key":"24_CR51","first-page":"1","volume":"2021","author":"H Zhang","year":"2021","unstructured":"Zhang, H., Shen, G., Guo, C., Cui, Y., Jiang, C.: EX-Action: automatically extracting threat actions from cyber threat intelligence report based on multimodal learning. Secur. Commun. Netw. 2021, 1\u201312 (2021)","journal-title":"Secur. Commun. Netw."},{"key":"24_CR52","doi-asserted-by":"crossref","unstructured":"Zhao, X., Jiang, R., Han, Y., Li, A., Peng, Z.: A survey on cybersecurity knowledge graph construction. Comput. Secur., 103524 (2023)","DOI":"10.1016\/j.cose.2023.103524"},{"key":"24_CR53","doi-asserted-by":"crossref","unstructured":"Zhou, P., Shi, W., Tian, J., Qi, Z., Li, B., Hao, H., Xu, B.: Attention-based bidirectional long short-term memory networks for relation classification. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (volume 2: Short papers), pp. 207\u2013212 (2016)","DOI":"10.18653\/v1\/P16-2034"},{"key":"24_CR54","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Ren, Y., Yi, M., Xiao, Y., Tan, Z., Moustafa, N., Tian, Z.: CDTier: a Chinese dataset of threat intelligence entity relationships. IEEE Trans. Sustain. Comput. (2023)","DOI":"10.1109\/TSUSC.2023.3240411"}],"container-title":["Lecture Notes in Computer Science","Natural Language Processing and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70239-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T06:06:30Z","timestamp":1726725990000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70239-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031702389","9783031702396"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70239-6_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"20 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NLDB","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications of Natural Language to Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nldb2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nldb2024.di.unito.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}