{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,8]],"date-time":"2025-06-08T04:01:05Z","timestamp":1749355265688,"version":"3.41.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:00:00Z","timestamp":1731283200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:00:00Z","timestamp":1731283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s13042-024-02424-9","type":"journal-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T02:25:14Z","timestamp":1731291914000},"page":"2849-2867","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Domain-adaptive entity recognition: unveiling the potential of CSER in cybersecurity and beyond"],"prefix":"10.1007","volume":"16","author":[{"given":"Md. Abu","family":"Marjan","sequence":"first","affiliation":[]},{"given":"Toshiyuki","family":"Amagasa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,11]]},"reference":[{"key":"2424_CR1","doi-asserted-by":"crossref","unstructured":"Simran K, Sriram S, Vinayakumar R, Soman K (2020) Deep learning approach for intelligent named entity recognition of cyber security. In: Advances in signal processing and intelligent recognition systems: 5th international symposium, SIRS 2019, Trivandrum, India, December 18\u201321, 2019, Revised Selected Papers 5. Springer, Berlin, pp 163\u2013172","DOI":"10.1007\/978-981-15-4828-4_14"},{"issue":"19","key":"2424_CR2","doi-asserted-by":"publisher","first-page":"3945","DOI":"10.3390\/app9193945","volume":"9","author":"H Gasmi","year":"2019","unstructured":"Gasmi H, Laval J, Bouras A (2019) Information extraction of cybersecurity concepts: an LSTM approach. Appl Sci 9(19):3945","journal-title":"Appl Sci"},{"issue":"4","key":"2424_CR3","doi-asserted-by":"publisher","first-page":"5593","DOI":"10.1109\/TII.2022.3192027","volume":"19","author":"J Yin","year":"2022","unstructured":"Yin J, Tang M, Cao J, You M, Wang H, Alazab M (2022) Knowledge-driven cybersecurity intelligence: software vulnerability coexploitation behavior discovery. IEEE Trans Ind Inf 19(4):5593\u20135601","journal-title":"IEEE Trans Ind Inf"},{"key":"2424_CR4","doi-asserted-by":"publisher","first-page":"2341","DOI":"10.1007\/s13042-020-01122-6","volume":"11","author":"G Kim","year":"2020","unstructured":"Kim G, Lee C, Jo J, Lim H (2020) Automatic extraction of named entities of cyber threats using a deep Bi-LSTM-CRF network. Int J Mach Learn Cybern 11:2341\u20132355","journal-title":"Int J Mach Learn Cybern"},{"key":"2424_CR5","doi-asserted-by":"crossref","unstructured":"Suh-Lee C, Jo J-Y, Kim Y (2016) Text mining for security threat detection discovering hidden information in unstructured log messages. In: 2016 IEEE conference on communications and network security (CNS). IEEE, pp 252\u2013260","DOI":"10.1109\/CNS.2016.7860492"},{"key":"2424_CR6","unstructured":"Pop T (2022) Named entity recognition and its application to phishing detection"},{"issue":"1","key":"2424_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-015-0013-4","volume":"2","author":"R Zuech","year":"2015","unstructured":"Zuech R, Khoshgoftaar TM, Wald R (2015) Intrusion detection and big heterogeneous data: a survey. J Big Data 2(1):1\u201341","journal-title":"J Big Data"},{"issue":"1","key":"2424_CR8","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1017\/S1351324916000334","volume":"23","author":"KW Church","year":"2017","unstructured":"Church KW (2017) Word2Vec. Nat Lang Eng 23(1):155\u2013162","journal-title":"Nat Lang Eng"},{"key":"2424_CR9","doi-asserted-by":"crossref","unstructured":"Pennington J, Socher R, Manning CD (2014) Glove: global vectors for word representation. In: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), pp 1532\u20131543","DOI":"10.3115\/v1\/D14-1162"},{"key":"2424_CR10","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1162\/tacl_a_00051","volume":"5","author":"P Bojanowski","year":"2017","unstructured":"Bojanowski P, Grave E, Joulin A, Mikolov T (2017) Enriching word vectors with subword information. Trans Assoc Comput Linguist 5:135\u2013146","journal-title":"Trans Assoc Comput Linguist"},{"key":"2424_CR11","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.procs.2023.01.027","volume":"218","author":"S Srivastava","year":"2023","unstructured":"Srivastava S, Paul B, Gupta D (2023) Study of word embeddings for enhanced cyber security named entity recognition. Proc Comput Sci 218:449\u2013460","journal-title":"Proc Comput Sci"},{"issue":"1","key":"2424_CR12","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1093\/bioinformatics\/btz528","volume":"36","author":"L Weber","year":"2020","unstructured":"Weber L, M\u00fcnchmeyer J, Rockt\u00e4schel T, Habibi M, Leser U (2020) HUNER: improving biomedical NER with pretraining. Bioinformatics 36(1):295\u2013302","journal-title":"Bioinformatics"},{"issue":"3","key":"2424_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.isci.2021.102155","volume":"24","author":"O Kononova","year":"2021","unstructured":"Kononova O, He T, Huo H, Trewartha A, Olivetti EA, Ceder G (2021) Opportunities and challenges of text mining in materials research. IScience 24(3):1","journal-title":"IScience"},{"key":"2424_CR14","doi-asserted-by":"crossref","unstructured":"Marjan MA, Amagasa T (2023) CSER: enhancing cybersecurity entity recognition through multidimensional feature fusion. In: 2023 IEEE international conference on big data (BigData). IEEE, pp 1214\u20131221","DOI":"10.1109\/BigData59044.2023.10386941"},{"key":"2424_CR15","first-page":"1","volume":"2023","author":"T Ahmad","year":"2023","unstructured":"Ahmad T, Wu J (2023) SDIGRU: spatial and deep features integration using multilayer gated recurrent unit for human activity recognition. IEEE Trans Comput Soc Syst 2023:1","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"2424_CR16","doi-asserted-by":"crossref","unstructured":"Liao X, Yuan K, Wang X, Li Z, Xing L, Beyah R (2016) Acing the IOC game: toward automatic discovery and analysis of open-source cyber threat intelligence. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 755\u2013766","DOI":"10.1145\/2976749.2978315"},{"key":"2424_CR17","doi-asserted-by":"crossref","unstructured":"Balduccini M, Kushner S, Speck J (2015) Ontology-driven data semantics discovery for cyber-security. In: Practical aspects of declarative languages: 17th international symposium, PADL 2015, Portland, OR, USA, June 18\u201319, 2015. Proceedings 17. Springer, pp 1\u201316","DOI":"10.1007\/978-3-319-19686-2_1"},{"key":"2424_CR18","doi-asserted-by":"crossref","unstructured":"Joshi A, Lal R, Finin T, Joshi A (2013) Extracting cybersecurity related linked data from text. In: 2013 IEEE seventh international conference on semantic computing. IEEE, pp 252\u2013259","DOI":"10.1109\/ICSC.2013.50"},{"key":"2424_CR19","doi-asserted-by":"crossref","unstructured":"Mulwad V, Li W, Joshi A, Finin T, Viswanathan K (2011) Extracting information about security vulnerabilities from web text. In: 2011 IEEE\/WIC\/ACM international conferences on web intelligence and intelligent agent technology, vol 3. IEEE, pp 257\u2013260","DOI":"10.1109\/WI-IAT.2011.26"},{"key":"2424_CR20","doi-asserted-by":"publisher","first-page":"33148","DOI":"10.1109\/ACCESS.2023.3263155","volume":"11","author":"T Ahmad","year":"2023","unstructured":"Ahmad T, Wu J, Alwageed HS, Khan F, Khan J, Lee Y (2023) Human activity recognition based on deep-temporal learning using convolution neural networks features and bidirectional gated recurrent unit with features selection. IEEE Access 11:33148\u201333159","journal-title":"IEEE Access"},{"key":"2424_CR21","first-page":"1","volume":"11","author":"T Ahmad","year":"2021","unstructured":"Ahmad T, Wu J, Khan I, Rahim A, Khan A (2021) Human action recognition in video sequence using logistic regression by features fusion approach based on CNN features. Int J Adv Comput Sci Appl 11:1","journal-title":"Int J Adv Comput Sci Appl"},{"key":"2424_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107524","volume":"233","author":"I Sarhan","year":"2021","unstructured":"Sarhan I, Spruit M (2021) Open-CYKG: an open cyber threat intelligence knowledge graph. Knowl Based Syst 233:107524","journal-title":"Knowl Based Syst"},{"key":"2424_CR23","doi-asserted-by":"crossref","unstructured":"Wang X, Liu X, Ao S, Li N, Jiang Z, Xu Z, Xiong Z, Xiong M, Zhang X (2020) DNRTI: a large-scale dataset for named entity recognition in threat intelligence. In: 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 1842\u20131848","DOI":"10.1109\/TrustCom50675.2020.00252"},{"key":"2424_CR24","unstructured":"Dong Y, Guo W, Chen Y, Xing X, Zhang Y, Wang G (2019) Towards the detection of inconsistencies in public security vulnerability reports. In: 28th USENIX security symposium (USENIX security 19), pp 869\u2013885"},{"key":"2424_CR25","doi-asserted-by":"crossref","unstructured":"Perera I, Hwang J, Bayas K, Dorr B, Wilks Y (2018) Cyberattack prediction through public text analysis and mini-theories. In: 2018 IEEE international conference on big data (big data). IEEE, pp 3001\u20133010","DOI":"10.1109\/BigData.2018.8622106"},{"key":"2424_CR26","doi-asserted-by":"publisher","first-page":"63214","DOI":"10.1109\/ACCESS.2020.2984582","volume":"8","author":"F Yi","year":"2020","unstructured":"Yi F, Jiang B, Wang L, Wu J (2020) Cybersecurity named entity recognition using multi-modal ensemble learning. IEEE Access 8:63214\u201363224","journal-title":"IEEE Access"},{"key":"2424_CR27","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K (2018) Bert: pre-training of deep bidirectional transformers for language understanding. Preprint arXiv:1810.04805"},{"key":"2424_CR28","doi-asserted-by":"crossref","unstructured":"Liu P, Li H, Wang Z, Liu J, Ren Y, Zhu H (2022) Multi-features based semantic augmentation networks for named entity recognition in threat intelligence. In: 2022 26th international conference on pattern recognition (ICPR). IEEE, pp 1557\u20131563","DOI":"10.1109\/ICPR56361.2022.9956373"},{"key":"2424_CR29","doi-asserted-by":"crossref","unstructured":"Ranade P, Piplai A, Joshi A, Finin T (2021) Cybert: contextualized embeddings for the cybersecurity domain. In: 2021 IEEE international conference on big data (big data). IEEE, pp 3334\u20133342","DOI":"10.1109\/BigData52589.2021.9671824"},{"key":"2424_CR30","doi-asserted-by":"crossref","unstructured":"Satvat K, Gjomemo R, Venkatakrishnan V (2021) Extractor: extracting attack behavior from threat reports. In: 2021 IEEE European symposium on security and privacy (EuroS &P). IEEE, pp 598\u2013615","DOI":"10.1109\/EuroSP51992.2021.00046"},{"key":"2424_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103579","volume":"136","author":"K Ahmed","year":"2024","unstructured":"Ahmed K, Khurshid SK, Hina S (2024) Cyberentrel: joint extraction of cyber entities and relations using deep learning. Comput Secur 136:103579","journal-title":"Comput Secur"},{"key":"2424_CR32","unstructured":"Liberato M (2022) Secbert: analyzing reports using Bert-like models. Master\u2019s thesis, University of Twente"},{"issue":"4","key":"2424_CR33","doi-asserted-by":"publisher","first-page":"214","DOI":"10.3390\/info15040214","volume":"15","author":"I Branescu","year":"2024","unstructured":"Branescu I, Grigorescu O, Dascalu M (2024) Automated mapping of common vulnerabilities and exposures to MITRE ATT &CK tactics. Information 15(4):214","journal-title":"Information"},{"key":"2424_CR34","doi-asserted-by":"crossref","unstructured":"Zhou K, Zhang S, Meng X, Luo Q, Wang Y, Ding K, Feng Y, Chen M, Cohen KB, Xia J (2018) CRF-LSTM text mining method unveiling the pharmacological mechanism of off-target side effect of anti-multiple myeloma drugs. In: Proceedings of the BioNLP 2018 workshop, pp 166\u2013171","DOI":"10.18653\/v1\/W18-2321"},{"key":"2424_CR35","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.jbi.2017.11.007","volume":"76","author":"IJ Unanue","year":"2017","unstructured":"Unanue IJ, Borzeshi EZ, Piccardi M (2017) Recurrent neural networks with specialized word embeddings for health-domain named-entity recognition. J Biomed Inform 76:102\u2013109","journal-title":"J Biomed Inform"},{"issue":"4","key":"2424_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patter.2022.100488","volume":"3","author":"A Trewartha","year":"2022","unstructured":"Trewartha A, Walker N, Huo H, Lee S, Cruse K, Dagdelen J, Dunn A, Persson KA, Ceder G, Jain A (2022) Quantifying the advantage of domain-specific pre-training on named entity recognition tasks in materials science. Patterns 3(4):1","journal-title":"Patterns"},{"issue":"1","key":"2424_CR37","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1038\/s41524-022-00784-w","volume":"8","author":"T Gupta","year":"2022","unstructured":"Gupta T, Zaki M, Krishnan NA, Mausam (2022) MATSCIBERT: a materials domain language model for text mining and information extraction. NPJ Comput Mater 8(1):102","journal-title":"NPJ Comput Mater"},{"issue":"4","key":"2424_CR38","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1561\/2200000013","volume":"4","author":"C Sutton","year":"2012","unstructured":"Sutton C, McCallum A et al (2012) An introduction to conditional random fields. Found Trends\u00ae Mach Learn 4(4):267\u2013373","journal-title":"Found Trends\u00ae Mach Learn"},{"issue":"1","key":"2424_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1758-2946-7-S1-S1","volume":"7","author":"M Krallinger","year":"2015","unstructured":"Krallinger M, Rabal O, Leitner F, Vazquez M, Salgado D, Lu Z, Leaman R, Lu Y, Ji D, Lowe DM et al (2015) The CHEMDNER corpus of chemicals and drugs and its annotation principles. J Cheminform 7(1):1\u201317","journal-title":"J Cheminform"},{"key":"2424_CR40","doi-asserted-by":"crossref","unstructured":"Yang X, Zhuo Y, Zuo J, Zhang X, Wilson S, Petzold L (2022) PCMSP: a dataset for scientific action graphs extraction from polycrystalline materials synthesis procedure text. Preprint arXiv:2210.12401","DOI":"10.18653\/v1\/2022.findings-emnlp.446"},{"key":"2424_CR41","doi-asserted-by":"crossref","unstructured":"Ramshaw LA, Marcus MP (1999) Text chunking using transformation-based learning. In: Natural language processing using very large corpora. Springer, London, pp 157\u2013176","DOI":"10.1007\/978-94-017-2390-9_10"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02424-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02424-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02424-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:31:52Z","timestamp":1749270712000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02424-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,11]]},"references-count":41,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["2424"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02424-9","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"type":"print","value":"1868-8071"},{"type":"electronic","value":"1868-808X"}],"subject":[],"published":{"date-parts":[[2024,11,11]]},"assertion":[{"value":"13 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}