{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T04:20:00Z","timestamp":1770524400910,"version":"3.49.0"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032159922","type":"print"},{"value":"9783032159939","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-15993-9_38","type":"book-chapter","created":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T05:52:10Z","timestamp":1770443530000},"page":"559-574","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["YACSDB-NER: Yet Another Cybersecurity Database for\u00a0Named Entity Recognition Task"],"prefix":"10.1007","author":[{"given":"Yuri","family":"do Amaral Nobre Maia","sequence":"first","affiliation":[]},{"given":"Robson","family":"de Oliveira Albuquerque","sequence":"additional","affiliation":[]},{"given":"Dem\u00e9trio Ant\u00f4nio","family":"da Silva Filho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,8]]},"reference":[{"key":"38_CR1","doi-asserted-by":"publisher","unstructured":"Aghaei, E., Niu, X., Shadid, W., Al-Shaer, E.: SecureBERT: a domain-specific language model for cybersecurity. In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 462 (2023). https:\/\/doi.org\/10.1007\/978-3-031-25538-0_3","DOI":"10.1007\/978-3-031-25538-0_3"},{"key":"38_CR2","unstructured":"Alves, P., Filho, G.P.R., Gon\u00e7alves, V.P.: Modelo de classifica\u00e7\u00e3o de TTP baseado em transformadas BERT. In: Proceedings of the Ibero American Conferences on Applied Computing 2022 and WWW\/Internet 2022 (2022). https:\/\/www.iadisportal.org\/digital-library\/modelo-de-classifica%C3%A7%C3%A3o-de-ttp-baseado-em-transformadas-bert"},{"key":"38_CR3","doi-asserted-by":"publisher","unstructured":"Ameri, K., Hempel, M., Sharif, H., Lopez, J., Perumalla, K.: CyBERT: cybersecurity claim classification by fine-tuning the BERT language model. J. Cybersecur. Priv. 1 (2021). https:\/\/doi.org\/10.3390\/jcp1040031","DOI":"10.3390\/jcp1040031"},{"key":"38_CR4","doi-asserted-by":"publisher","unstructured":"Bayer, M., Kaufhold, M.A., Reuter, C.: A survey on data augmentation for text classification. ACM Comput. Surv. 55 (2022). https:\/\/doi.org\/10.1145\/3544558","DOI":"10.1145\/3544558"},{"key":"38_CR5","doi-asserted-by":"publisher","unstructured":"Bayer, M., Kuehn, P., Shanehsaz, R., Reuter, C.: CysecBERT: a domain-adapted language model for the cybersecurity domain. ACM Trans. Priv. Secur. 27 (2024). https:\/\/doi.org\/10.1145\/3652594","DOI":"10.1145\/3652594"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Dasgupta, S., Piplai, A., Kotal, A., Joshi, A.: A comparative study of deep learning based named entity recognition algorithms for cybersecurity. In: 2020 IEEE International Conference on Big Data (Big Data), pp. 2596\u20132604. IEEE (2020)","DOI":"10.1109\/BigData50022.2020.9378482"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Deka, P., Rajapaksha, S., Rani, R., Almutairi, A., Karafili, E.: AttackER: towards enhancing cyber-attack attribution with a named entity recognition dataset. In: International Conference on Web Information Systems Engineering, pp. 255\u2013270. Springer (2024)","DOI":"10.1007\/978-981-96-0576-7_20"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, volume 1 (long and short papers), pp. 4171\u20134186 (2019)","DOI":"10.18653\/v1\/N19-1423"},{"key":"38_CR9","doi-asserted-by":"publisher","unstructured":"Ding, N., et al.: Few-NERD: a few-shot named entity recognition dataset. In: ACL-IJCNLP 2021 - 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, Proceedings of the Conference (2021). https:\/\/doi.org\/10.18653\/v1\/2021.acl-long.248","DOI":"10.18653\/v1\/2021.acl-long.248"},{"key":"38_CR10","unstructured":"Gemini Team, et al.: Gemini 1.5: unlocking multimodal understanding across millions of tokens of context (2024). https:\/\/arxiv.org\/abs\/2403.05530"},{"key":"38_CR11","unstructured":"Gemini Team, et al.: Gemini: a family of highly capable multimodal models (2024). https:\/\/arxiv.org\/abs\/2312.11805"},{"key":"38_CR12","unstructured":"Han, Z., Gao, C., Liu, J., Zhang, J., Zhang, S.Q.: Parameter-efficient fine-tuning for large models: a comprehensive survey. arXiv preprint arXiv:2403.14608 (2024)"},{"key":"38_CR13","unstructured":"Hanks, C., Maiden, M., Ranade, P., Finin, T., Joshi, A., et\u00a0al.: Recognizing and extracting cybersecurity entities from text. In: Workshop on Machine Learning for Cybersecurity, International Conference on Machine Learning (2022)"},{"key":"38_CR14","unstructured":"Hendrycks, D., et al.: Measuring massive multitask language understanding. arXiv preprint arXiv:2009.03300 (2020)"},{"key":"38_CR15","unstructured":"Jordan, B., Piazza, R., Darley, T.: Stix version 2.1 (2021). https:\/\/docs.oasis-open.org\/cti\/stix\/v2.1\/os\/stix-v2.1-os.html. Accessed 28 Feb 2025"},{"key":"38_CR16","unstructured":"Legoy, V., Caselli, M., Seifert, C., Peter, A.: Automated retrieval of ATT &CK tactics and techniques for cyber threat reports (2020)"},{"key":"38_CR17","doi-asserted-by":"publisher","unstructured":"Lim, S.K., Muis, A.O., Lu, W., Ong, C.H.: MalwareTextDB: a database for annotated malware articles. In: ACL 2017 - 55th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference (Long Papers), vol.\u00a01 (2017). https:\/\/doi.org\/10.18653\/v1\/P17-1143","DOI":"10.18653\/v1\/P17-1143"},{"key":"38_CR18","unstructured":"Liu, Y., et al.: RoBERTa: a robustly optimized BERT pretraining approach. arXiv preprint arXiv:1907.11692 (2019)"},{"key":"38_CR19","doi-asserted-by":"publisher","unstructured":"Marchiori, F., Conti, M., Verde, N.V.: STIXnet: a novel and modular solution for extracting all STIX objects in CTI reports. In: ACM International Conference Proceeding Series (2023). https:\/\/doi.org\/10.1145\/3600160.3600182","DOI":"10.1145\/3600160.3600182"},{"key":"38_CR20","doi-asserted-by":"publisher","unstructured":"Peng, B., Chersoni, E., Hsu, Y.Y., Huang, C.R.: Is domain adaptation worth your investment? Comparing BERT and finBERT on financial tasks. In: Proceedings of the 3rd Workshop on Economics and Natural Language Processing, ECONLP 2021 (2021). https:\/\/doi.org\/10.18653\/v1\/2021.econlp-1.5. Domain adaptation shows to be good on biomedical domain","DOI":"10.18653\/v1\/2021.econlp-1.5"},{"key":"38_CR21","doi-asserted-by":"publisher","unstructured":"Rahman, M.R., Mahdavi-Hezaveh, R., Williams, L.: A literature review on mining cyberthreat intelligence from unstructured texts. In: IEEE International Conference on Data Mining Workshops, ICDMW, vol. 2020 (2020). https:\/\/doi.org\/10.1109\/ICDMW51313.2020.00075","DOI":"10.1109\/ICDMW51313.2020.00075"},{"key":"38_CR22","doi-asserted-by":"publisher","unstructured":"Ranade, P., Piplai, A., Joshi, A., Finin, T.: CyBERT: contextualized embeddings for the cybersecurity domain. In: Proceedings - 2021 IEEE International Conference on Big Data, Big Data 2021 (2021). https:\/\/doi.org\/10.1109\/BigData52589.2021.9671824","DOI":"10.1109\/BigData52589.2021.9671824"},{"key":"38_CR23","unstructured":"Sauerwein, C., Pfohl, A.: Towards automated classification of attackers\u2019 TTPS by combining NLP with ml techniques. arXiv preprint arXiv:2207.08478 (2022)"},{"key":"38_CR24","unstructured":"Siracusano, G., et al.: Time for action: automated analysis of cyber threat intelligence in the wild. arXiv preprint arXiv:2307.10214 (2023)"},{"key":"38_CR25","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-030-32381-3_16","volume-title":"Chinese Computational Linguistics","author":"C Sun","year":"2019","unstructured":"Sun, C., Qiu, X., Xu, Y., Huang, X.: How to fine-tune BERT for text classification? In: Sun, M., Huang, X., Ji, H., Liu, Z., Liu, Y. (eds.) CCL 2019. LNCS (LNAI), vol. 11856, pp. 194\u2013206. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32381-3_16"},{"key":"38_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-030-51310-8_2","volume-title":"Natural Language Processing and Information Systems","author":"M Tikhomirov","year":"2020","unstructured":"Tikhomirov, M., Loukachevitch, N., Sirotina, A., Dobrov, B.: Using BERT and augmentation in named entity recognition for cybersecurity domain. In: M\u00e9tais, E., Meziane, F., Horacek, H., Cimiano, P. (eds.) NLDB 2020. LNCS, vol. 12089, pp. 16\u201324. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51310-8_2"},{"key":"38_CR27","doi-asserted-by":"crossref","unstructured":"Tual, S., Abadie, N., Chazalon, J., Dum\u00e9nieu, B., Carlinet, E.: A benchmark of nested named entity recognition approaches in historical structured documents. In: International Conference on Document Analysis and Recognition, pp. 115\u2013131. Springer (2023)","DOI":"10.1007\/978-3-031-41682-8_8"},{"key":"38_CR28","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 2017 (2017)"},{"key":"38_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103824","volume":"141","author":"G Wang","year":"2024","unstructured":"Wang, G., Liu, P., Huang, J., Bin, H., Wang, X., Zhu, H.: KnowCTI: knowledge-based cyber threat intelligence entity and relation extraction. Comput. Secur. 141, 103824 (2024)","journal-title":"Comput. Secur."},{"key":"38_CR30","doi-asserted-by":"publisher","unstructured":"Wang, X., et al.: APTNER: a specific dataset for NER missions in cyber threat intelligence field. In: 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022 (2022). https:\/\/doi.org\/10.1109\/CSCWD54268.2022.9776031","DOI":"10.1109\/CSCWD54268.2022.9776031"},{"key":"38_CR31","doi-asserted-by":"crossref","unstructured":"Wang, X., et al.: DNRTI: a large-scale dataset for named entity recognition in threat intelligence. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1842\u20131848. IEEE (2020)","DOI":"10.1109\/TrustCom50675.2020.00252"},{"key":"38_CR32","doi-asserted-by":"publisher","unstructured":"Yi, F., Jiang, B., Wang, L., Wu, J.: Cybersecurity named entity recognition using multi-modal ensemble learning. IEEE Access 8 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2984582","DOI":"10.1109\/ACCESS.2020.2984582"},{"key":"38_CR33","doi-asserted-by":"publisher","unstructured":"You, Y., et al.: TIM: threat context-enhanced TTP intelligence mining on unstructured threat data. Cybersecurity 5 (2022). https:\/\/doi.org\/10.1186\/s42400-021-00106-5","DOI":"10.1186\/s42400-021-00106-5"},{"key":"38_CR34","doi-asserted-by":"crossref","unstructured":"Zanella, L., Toussaint, Y.: Adding linguistic information to transformer models improves biomedical event detection? In: 2023 18th Conference on Computer Science and Intelligence Systems (FedCSIS), pp. 1211\u20131216. IEEE (2023)","DOI":"10.15439\/2023F2076"},{"key":"38_CR35","doi-asserted-by":"publisher","unstructured":"Zhao, J., Yan, Q., Li, J., Shao, M., He, Z., Li, B.: TIMiner: automatically extracting and analyzing categorized cyber threat intelligence from social data. Comput. Secur. 95 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101867","DOI":"10.1016\/j.cose.2020.101867"}],"container-title":["Lecture Notes in Computer Science","Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-15993-9_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T05:52:14Z","timestamp":1770443534000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-15993-9_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032159922","9783032159939"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-15993-9_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"8 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"BRACIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazilian Conference on Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fortaleza-CE","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazil","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bracis2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bracis.sbc.org.br\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}