{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T12:04:32Z","timestamp":1775563472131,"version":"3.50.1"},"reference-count":15,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T00:00:00Z","timestamp":1772928000000},"content-version":"vor","delay-in-days":66,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.03.161","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T12:39:40Z","timestamp":1774355980000},"page":"1705-1712","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Literature Review on Natural Language Processing Techniques for Information Security Risk Classification"],"prefix":"10.1016","volume":"278","author":[{"given":"Nasra","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Virginia","family":"Araujo","sequence":"additional","affiliation":[]},{"given":"Luisa","family":"Domingues","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/j.procs.2026.03.161_bib1","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.6007\/IJARBSS\/v12-i5\/12924","article-title":"A review of cybersecurity risk management framework in Malaysia higher education institutions","volume":"12","author":"Dioubate","year":"2022","journal-title":"International Journal of Academic Research in Business and Social Sciences"},{"issue":"10","key":"10.1016\/j.procs.2026.03.161_bib2","doi-asserted-by":"crossref","first-page":"2033","DOI":"10.1111\/risa.14100","article-title":"Textual data transformations using natural language processing for risk assessment","volume":"43","author":"Kamil","year":"2023","journal-title":"Risk Analysis"},{"issue":"3","key":"10.1016\/j.procs.2026.03.161_bib3","first-page":"45","article-title":"Natural Language Processing for Cybersecurity Incident Analysis","volume":"15","author":"Ogundairo","year":"2024","journal-title":"Journal of Cyber Security"},{"key":"10.1016\/j.procs.2026.03.161_bib4","unstructured":"ENISA. (2024). Threat landscape report. European Union Agency for Cybersecurity. https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2024"},{"issue":"2","key":"10.1016\/j.procs.2026.03.161_bib5","first-page":"123","article-title":"Using GPT for threat intelligence analysis: Opportunities and challenges","volume":"8","author":"Zhou","year":"2022","journal-title":"Cybersecurity Journal"},{"key":"10.1016\/j.procs.2026.03.161_bib6","first-page":"1","article-title":"Procedures for performing systematic reviews","volume":"33","author":"Kitchenham","year":"2004","journal-title":"Keele University Technical Report"},{"key":"10.1016\/j.procs.2026.03.161_bib7","doi-asserted-by":"crossref","unstructured":"Yang, X., Zhang, H., & Huang, X. (2024). An intelligent risk assessment model based on NLP. In 2024 4th International Conference on Consumer Electronics and Computer Engineering (ICCECE), 375\u2013382. https:\/\/doi.org\/10.1109\/ICCECE58074.2024.10388456","DOI":"10.1109\/ICCECE61317.2024.10504168"},{"key":"10.1016\/j.procs.2026.03.161_bib8","unstructured":"Wang, L., Cheng, Y., Xiang, A., Zhang, J., & Yang, H. (2024). Application of natural language processing in financial risk detection. arXiv preprint arXiv:2406.09765. https:\/\/doi.org\/10.48550\/arXiv.2406.09765"},{"issue":"1","key":"10.1016\/j.procs.2026.03.161_bib9","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s10207-023-00769-w","article-title":"Cyber threat assessment and management for securing healthcare ecosystems using natural language processing","volume":"23","author":"Silvestri","year":"2024","journal-title":"International Journal of Information Security"},{"key":"10.1016\/j.procs.2026.03.161_bib10","doi-asserted-by":"crossref","first-page":"104465","DOI":"10.1016\/j.autcon.2022.104465","article-title":"Automated detection of contractual risk clauses from construction specifications using bidirectional encoder representations from transformers (BERT)","volume":"142","author":"Moon","year":"2022","journal-title":"Automation in Construction"},{"issue":"12","key":"10.1016\/j.procs.2026.03.161_bib11","doi-asserted-by":"crossref","first-page":"04021164","DOI":"10.1061\/(ASCE)CO.1943-7862.0002206","article-title":"An empirical analysis of risk similarity among major transportation projects using natural language processing","volume":"147","author":"Erfani","year":"2021","journal-title":"Journal of Construction Engineering & Management"},{"key":"10.1016\/j.procs.2026.03.161_bib12","unstructured":"Akinfaderin, A. (2023). Event Type Classification and Trend Analysis of Cybersecurity News Using Dynamic Topic Modeling. International Conference on Cybersecurity and Privacy, 234-248."},{"key":"10.1016\/j.procs.2026.03.161_bib13","doi-asserted-by":"crossref","unstructured":"Chakrabarti, D., Patodia, N., Bhattacharya, U., Mitra, I., Roy, S., Mandi, J., Roy, N., & Nandy, P. (2019). Use of artificial intelligence to analyse risk in legal documents for a better decision support. TENCON 2018 - IEEE Region 10 Conference, 683\u2013688. https:\/\/doi.org\/10.1109\/TENCON.2018.8650328","DOI":"10.1109\/TENCON.2018.8650382"},{"issue":"7","key":"10.1016\/j.procs.2026.03.161_bib14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3462477","article-title":"Text Mining in Cybersecurity: A Systematic Literature Review","volume":"54","author":"Ignaczak","year":"2022","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.procs.2026.03.161_bib15","series-title":"Natural language processing in action: Understanding, analyzing, and generating text with Python","author":"Hapke","year":"2019"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926007568?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926007568?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T11:21:59Z","timestamp":1775560919000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926007568"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":15,"alternative-id":["S1877050926007568"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.161","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Literature Review on Natural Language Processing Techniques for Information Security Risk Classification","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.161","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}