{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T06:04:21Z","timestamp":1760853861389,"version":"3.41.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319273990"},{"type":"electronic","value":"9783319274003"}],"license":[{"start":{"date-parts":[[2015,11,18]],"date-time":"2015-11-18T00:00:00Z","timestamp":1447804800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-27400-3_36","type":"book-chapter","created":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T17:08:38Z","timestamp":1448989718000},"page":"405-416","source":"Crossref","is-referenced-by-count":6,"title":["Detection of Zero Day Exploits Using Real-Time Social Media Streams"],"prefix":"10.1007","author":[{"given":"Dennis","family":"Kergl","sequence":"first","affiliation":[]},{"given":"Robert","family":"Roedler","sequence":"additional","affiliation":[]},{"given":"Gabi Dreo","family":"Rodosek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,18]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","unstructured":"Zuech, R., Khoshgoftaar, T.M., Wald, R.: Intrusion detection and Big Heterogeneous Data: a Survey, J. Big Data 2(1) (2015). doi: 10.1186\/s40537-015-0013-4 , http:\/\/www.journalofbigdata.com\/content\/2\/1\/3","DOI":"10.1186\/s40537-015-0013-4"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Aoyama, T., Naruoka, H., Koshijima, I., Machii, W., Seki, K.: Control Conference (ASCC), 2015 10th Asian, pp. 1\u20134. IEEE (2015)","DOI":"10.1109\/ASCC.2015.7244713"},{"key":"36_CR3","doi-asserted-by":"publisher","unstructured":"Yang, C.C., Tseng, S.S., Lee, T.J., Weng, J.F., Chen, K.: Proceedings of the 12th IEEE International Conference on Advanced Learning Technologies, ICALT 2012, pp. 121\u2013123 (2012). doi: 10.1109\/ICALT.2012.174","DOI":"10.1109\/ICALT.2012.174"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Seeber, S., Rodosek, G.D.: 10th International Conference on Network and Service Management (CNSM), 2014, pp. 376\u2013381. IEEE (2014)","DOI":"10.1109\/CNSM.2014.7014198"},{"key":"36_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20034-7","volume-title":"Intelligent Mechanisms for Network Configuration and Security","year":"2015","unstructured":"Seeber, S., Rodosek, G.D.: 9122, 134 (2015). doi: 10.1007\/978-3-319-20034-7 , http:\/\/link.springer.com\/10.1007\/978-3-319-20034-7"},{"key":"36_CR6","doi-asserted-by":"publisher","unstructured":"Derczynski, L.R.A., Yang, B., Jensen, C.S.: Proceedings of the 16th International Conference on Extending Database Technology\u2014EDBT\u201913, p. 137 (2013). doi: 10.1145\/2452376.2452393 , http:\/\/dl.acm.org\/citation.cfm?doid=2452376.2452393","DOI":"10.1145\/2452376.2452393"},{"key":"36_CR7","unstructured":"Wang, X., Wei, F., Liu, X., Zhou, M., Zhang, M.: pp. 1031\u20131040 (2011)"},{"key":"36_CR8","unstructured":"Narr, S., Hulfenhaus, M., Albayrak, S.: Proceedings of KDML-2012, the 2012 Workshop on Knowledge Discovery, Data Mining and Machine Learning (2012)"},{"key":"36_CR9","doi-asserted-by":"publisher","unstructured":"Shamsi, Z., Nandwani, A., Leonard, D., Loguinov, D.: pp. 195\u2013206. doi: 10.1145\/2591971.2591972","DOI":"10.1145\/2591971.2591972"},{"key":"36_CR10","doi-asserted-by":"publisher","unstructured":"Kergl, D., Roedler, R., Seeber, S.: 2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), pp. 357\u2013364. IEEE, Asonam (2014) doi: 10.1109\/ASONAM.2014.6921610 , http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=6921610","DOI":"10.1109\/ASONAM.2014.6921610"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Ritter, A., Wright, E., Casey, W., Mitchell, T.: Proceedings of the 24th International Conference on World Wide Web, pp. 896\u2013905. International World Wide Web Conferences Steering Committee (2015)","DOI":"10.1145\/2736277.2741083"},{"key":"36_CR12","doi-asserted-by":"publisher","unstructured":"Augustine, E., Cushing, C.: Proceedings of the 21st international conference companion on World Wide Web, pp. 13\u201322 (2012). doi: 10.1145\/2187980.2187983 , http:\/\/dl.acm.org\/citation.cfm?id=2187983","DOI":"10.1145\/2187980.2187983"},{"key":"36_CR13","unstructured":"Motoyama, M., Meeder, B., Levchenko, K., Voelker, G.M., Savage, S.: Proceedings of the 3rd conference on Online social networks (WOSN\u201910) (2010). http:\/\/dl.acm.org\/citation.cfm?id=1863203"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Sampson, J., Morstatter, F., Maciejewski, R., Liu, H.: Proceedings of the 26th ACM Conference on Hypertext and Social Media, pp. 237\u2013245. ACM (2015)","DOI":"10.1145\/2700171.2791030"},{"key":"36_CR15","unstructured":"Bontcheva, K., Derczynski, L., Funk, A., Greenwood, M.A., Maynard, D., Aswani, N.: RANLP, pp. 83 (September 2013)"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Nature and Biologically Inspired Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27400-3_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T16:40:28Z","timestamp":1748709628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27400-3_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,18]]},"ISBN":["9783319273990","9783319274003"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27400-3_36","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,11,18]]}}}