{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:36:13Z","timestamp":1743129373566,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319930398"},{"type":"electronic","value":"9783319930404"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93040-4_41","type":"book-chapter","created":{"date-parts":[[2018,6,16]],"date-time":"2018-06-16T13:29:41Z","timestamp":1529155781000},"page":"517-529","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["RIPEx: Extracting Malicious IP Addresses from Security Forums Using Cross-Forum Learning"],"prefix":"10.1007","author":[{"given":"Joobin","family":"Gharibshah","sequence":"first","affiliation":[]},{"given":"Evangelos E.","family":"Papalexakis","sequence":"additional","affiliation":[]},{"given":"Michalis","family":"Faloutsos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,17]]},"reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"Abbasi, A., Li, W., Benjamin, V., Hu, S., Chen, H.: Descriptive analytics: examining expert hackers in web forums. In: ISI 2014, pp. 56\u201363 (2014)","DOI":"10.1109\/JISIC.2014.18"},{"key":"41_CR2","unstructured":"Bridges, R.A., Jones, C.L., Iannacone, M.D., Goodall, J.R.: Automatic labeling for entity extraction in cyber security (2013) CoRR abs\/1308.4941"},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Dai, W., Xue, G.R., Yang, Q., Yu, Y.: Co-clustering based classification for out-of-domain documents. In: KDD 2007, pp. 210\u2013219, USA (2007)","DOI":"10.1145\/1281192.1281218"},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"Dai, W., Yang, Q., Xue, G.R., Yu, Y.: Boosting for transfer learning. In: ICML 2007, pp. 193\u2013200, New York, NY, USA (2007)","DOI":"10.1145\/1273496.1273521"},{"key":"41_CR5","unstructured":"Daume III, H.: Frustratingly easy domain adaptation. In: ACL 2007 (2007)"},{"key":"41_CR6","doi-asserted-by":"crossref","unstructured":"Finkel, J.R., Grenager, T., Manning, C.: Incorporating non-local information into information extraction systems by Gibbs sampling. In: ACL 2005 (2005)","DOI":"10.3115\/1219840.1219885"},{"key":"41_CR7","doi-asserted-by":"crossref","unstructured":"Frank, R., Macdonald, M., Monk, B.: Location, location, location: mapping potential Canadian targets in online hacker discussion forums. In: EISIC 2016 (2016)","DOI":"10.1109\/EISIC.2016.012"},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Gharibshah, J., Li, T.C., Vanrell, M.S., Castro, A., Pelechrinis, K., Papalexakis, E., Faloutsos, M.: InferIp: Extracting actionable information from security discussion forums. In: ASONAM 2017 (2017)","DOI":"10.1145\/3110025.3110055"},{"key":"41_CR9","unstructured":"Holt, T.J., Strumsky, D., Smirnova, O., Kilger, M.: Examining the social networks of malware writers and hackers 6(1), 891\u2013903 (2012)"},{"key":"41_CR10","doi-asserted-by":"crossref","unstructured":"Jones, C.L., Bridges, R.A., Huffer, K.M.T., Goodall, J.R.: Towards a relation extraction framework for cyber-security concepts (2015) CoRR abs\/1504.04317","DOI":"10.1145\/2746266.2746277"},{"key":"41_CR11","doi-asserted-by":"crossref","unstructured":"Motoyama, M., McCoy, D., Levchenko, K., Savage, S., Voelker, G.M.: An analysis of underground forums. In: IMC 2011, pp. 71\u201380, New York, NY, USA (2011)","DOI":"10.1145\/2068816.2068824"},{"issue":"10","key":"41_CR12","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2010","unstructured":"Pan, S.J., Yang, Q.: A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22(10), 1345\u20131359 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"41_CR13","doi-asserted-by":"crossref","unstructured":"Portnoff, R.S., Afroz, S., Durrett, G., Kummerfeld, J.K., Berg-Kirkpatrick, T., McCoy, D., Levchenko, K., Paxson, V.: Tools for automated analysis of cybercriminal markets. In: WWW 2017 (2017)","DOI":"10.1145\/3038912.3052600"},{"key":"41_CR14","unstructured":"Ramos, J.: Using TF-IDF to determine word relevance in document queries. In: ICML 2003 (2003)"},{"key":"41_CR15","doi-asserted-by":"crossref","unstructured":"Samtani, S., Chinn, R., Chen, H.: Exploring hacker assets in underground forums. In: ISI 2015, pp. 31\u201336 (2015)","DOI":"10.1109\/ISI.2015.7165935"},{"key":"41_CR16","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-319-32699-3_11","volume-title":"Cyber Deception","author":"J Shakarian","year":"2016","unstructured":"Shakarian, J., Gunn, A.T., Shakarian, P.: Exploring malicious hacker forums. In: Jajodia, S., Subrahmanian, V.S.S., Swarup, V., Wang, C. (eds.) Cyber Deception, pp. 261\u2013284. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-32699-3_11"},{"issue":"1","key":"41_CR17","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/s40537-016-0043-6","volume":"3","author":"K Weiss","year":"2016","unstructured":"Weiss, K., Khoshgoftaar, T.M., Wang, D.: A survey of transfer learning. J. Big Data 3(1), 9 (2016)","journal-title":"J. Big Data"},{"issue":"6","key":"41_CR18","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1007\/s10796-015-9567-0","volume":"17","author":"X Zhang","year":"2015","unstructured":"Zhang, X., Tsang, A., Yue, W.T., Chau, M.: The classification of hackers by knowledge exchange behaviors. Info. Syst. Front. 17(6), 1239\u20131251 (2015)","journal-title":"Info. Syst. Front."}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93040-4_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T10:07:56Z","timestamp":1710324476000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-93040-4_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319930398","9783319930404"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93040-4_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"17 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/prada-research.net\/pakdd18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}