{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:57:46Z","timestamp":1759334266283,"version":"build-2065373602"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1751255"],"award-info":[{"award-number":["1751255"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-CR0000003"],"award-info":[{"award-number":["DE-CR0000003"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3607382","type":"journal-article","created":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T17:47:20Z","timestamp":1757353640000},"page":"163189-163200","source":"Crossref","is-referenced-by-count":0,"title":["Twitter-Based OSINT for Cyber Event Analytics"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4024-8030","authenticated-orcid":false,"given":"Dakota S.","family":"Dale","sequence":"first","affiliation":[{"name":"Bastazo, Inc., Bentonville, AR, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7809-6554","authenticated-orcid":false,"given":"Kylie","family":"Mcclanahan","sequence":"additional","affiliation":[{"name":"Bastazo, Inc., Bentonville, AR, USA"}]},{"given":"W. Sky","family":"Elder","sequence":"additional","affiliation":[{"name":"University of Arkansas, Fayetteville, AR, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7734-6216","authenticated-orcid":false,"given":"Qinghua","family":"Li","sequence":"additional","affiliation":[{"name":"University of Arkansas, Fayetteville, AR, USA"}]}],"member":"263","reference":[{"volume-title":"2022 Sonicwall Cyber Threat Report","year":"2022","key":"ref1"},{"volume-title":"The Red Report","year":"2021","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.tej.2017.02.006"},{"article-title":"\u2018Jugular\u2019 of the U.S. fuel pipeline system shuts down after cyberattack","year":"2021","author":"Gonzalez","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.11610\/isij.4703"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5604\/01.3001.0012.1474"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080305"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191528"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.28.230"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930715"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013542"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517865"},{"key":"ref13","first-page":"1","article-title":"CTIKG: LLM-powered knowledge graph construction from cyber threat intelligence","volume-title":"Proc. 1st Conf. Lang. Modeling","author":"Huang"},{"key":"ref14","first-page":"386","article-title":"Constructing a knowledge graph from textual descriptions of software vulnerabilities in the national vulnerability database","volume-title":"Proc. 24th Nordic Conf. Comput. Linguistics (NoDaLiDa)","author":"H\u00f8st"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103999","article-title":"LLM-TIKG: Threat intelligence knowledge graph construction utilizing large language model","volume":"145","author":"Hu","year":"2024","journal-title":"Comput. Secur."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icnc59896.2024.10555953"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2014.6921656"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752338"},{"key":"ref19","first-page":"220","article-title":"Twitterosint: Automated cybersecurity threat intelligence collection and analysis using Twitter data","volume-title":"Proc. Int. Conf. Secur. Manage. (SAM)","author":"Vadapalli"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3344379"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8852475"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC57223.2023.10074187"},{"volume-title":"Open Source Intelligence for Cybersecurity Events Via Twitter Data","year":"2023","author":"Dale","key":"ref23"},{"article-title":"Twitter sentiment classification using distant supervision","year":"2009","author":"Go","key":"ref24"},{"article-title":"Predicting us political party affiliation on Twitter","year":"2018","author":"Lee","key":"ref25"},{"article-title":"Predicting consumers\u2019 brand sentiment using text analysis on Reddit","year":"2020","author":"Cen","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1186\/s12864-021-08239-0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOMP.2016.7425811"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207159"},{"volume-title":"Cisco Urges Admins to Patch Ios Xr Zero-Day Exploited in Attacks","year":"2022","author":"Gatlan","key":"ref30"},{"volume-title":"Singapore Computer Emergency Response Team","year":"2022","key":"ref31"},{"volume-title":"Singapore Computer Emergency Response Team","year":"2022","key":"ref32"},{"article-title":"The race to the vulnerable: Measuring the log4j shell incident","volume-title":"Proc. Network Traffic Meas. Anal. Conf. (TMA)","author":"Hiesgen","key":"ref33"},{"volume-title":"Hackers Used the Log4j Flaw to Gain Access Before Moving Across a Company\u2019s Network, Say Security Researchers","year":"2022","key":"ref34"},{"article-title":"North korea-linked lazarus apt uses log4j to target vmware servers","year":"2022","author":"Paganini","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470039"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm47815.2020.9303019"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162309"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90019-9_4"},{"volume-title":"X Developer Platform","year":"2025","key":"ref40"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6287639\/10820123\/11153645-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11153645.pdf?arnumber=11153645","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T13:20:42Z","timestamp":1759238442000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11153645\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3607382","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}