{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:29:01Z","timestamp":1760660941312,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032008275","type":"print"},{"value":"9783032008282","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-00828-2_32","type":"book-chapter","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T16:23:19Z","timestamp":1760631799000},"page":"515-520","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Evolaris: A Roadmap to\u00a0Self-evolving Software Intelligence Management"],"prefix":"10.1007","author":[{"given":"Chengwei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Wenbo","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yuxin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Limin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Sen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Bu","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"32_CR1","unstructured":"National vulnerability database (2024). https:\/\/nvd.nist.gov\/. Accessed 30 Apr 2024"},{"key":"32_CR2","unstructured":"Bouwman, X., et al.: Helping hands: measuring the impact of a large threat intelligence sharing community. In: 31st USENIX Security Symposium (USENIX Security 2022), pp. 1149\u20131165 (2022)"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Gao, P., et al.: A system for automated open-source threat intelligence gathering and management. In: Proceedings of the 2021 International Conference on Management of Data, pp. 2716\u20132720 (2021)","DOI":"10.1145\/3448016.3452745"},{"key":"32_CR4","unstructured":"Guo, W., et al.: PackageIntel: leveraging large language models for automated intelligence extraction in package ecosystems (2024). https:\/\/arxiv.org\/abs\/2409.15049"},{"key":"32_CR5","doi-asserted-by":"publisher","first-page":"102763","DOI":"10.1016\/j.cose.2022.102763","volume":"120","author":"H Jo","year":"2022","unstructured":"Jo, H., Lee, Y., Shin, S.: Vulcan: automatic extraction and analysis of cyber threat intelligence from unstructured text. Comput. Secur. 120, 102763 (2022)","journal-title":"Comput. Secur."},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Mulwad, V., Li, W., Joshi, A., Finin, T., Viswanathan, K.: Extracting information about security vulnerabilities from web text. In: 2011 IEEE\/WIC\/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, vol.\u00a03, pp. 257\u2013260. IEEE (2011)","DOI":"10.1109\/WI-IAT.2011.26"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Purba, M.D., Chu, B.: Extracting actionable cyber threat intelligence from twitter stream. In: 2023 IEEE International Conference on Intelligence and Security Informatics (ISI), pp.\u00a01\u20136. IEEE (2023)","DOI":"10.1109\/ISI58743.2023.10297205"},{"key":"32_CR8","unstructured":"Sabottke, C., Suciu, O., Dumitra\u015f, T.: Vulnerability disclosure in the age of social media: exploiting twitter for predicting $$\\{$$Real-World$$\\}$$ exploits. In: 24th USENIX Security Symposium (USENIX Security 2015), pp. 1041\u20131056 (2015)"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Satvat, K., Gjomemo, R., Venkatakrishnan, V.: Extractor: extracting attack behavior from threat reports. In: 2021 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 598\u2013615. IEEE (2021)","DOI":"10.1109\/EuroSP51992.2021.00046"}],"container-title":["Lecture Notes in Computer Science","Engineering of Complex Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00828-2_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T16:23:23Z","timestamp":1760631803000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00828-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"ISBN":["9783032008275","9783032008282"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00828-2_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"17 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICECCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Engineering of Complex Computer Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iceccs2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iceccs2025-hangzhou.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}