{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:36:24Z","timestamp":1764174984930,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,10]]},"DOI":"10.1109\/bigdata50022.2020.9378220","type":"proceedings-article","created":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T17:10:21Z","timestamp":1616173821000},"page":"2232-2241","source":"Crossref","is-referenced-by-count":16,"title":["Exploring Open Source Information for Cyber Threat Intelligence"],"prefix":"10.1109","author":[{"given":"Victor","family":"Adewopo","sequence":"first","affiliation":[]},{"given":"Bilal","family":"Gonen","sequence":"additional","affiliation":[]},{"given":"Festus","family":"Adewopo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-018-2264-5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587327"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4143\/crt.2019.139"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2019.00058"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622506"},{"key":"ref13","first-page":"659","article-title":"Design of an Ontology Based Adaptive Crawler for Hidden Web","author":"dixit","year":"2013","journal-title":"2013 International Conference on Communication Systems and Network Technologies"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2019.8823360"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1017\/9781316888513"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433442"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813706"},{"year":"2019","key":"ref18","article-title":"2019 Cost of a Data Breach Report &#x2014; IBM Security"},{"key":"ref19","article-title":"5 Biggest Data Breaches of 2020\ufffd(So Far)","author":"dutta","year":"2020","journal-title":"Security Boulevard"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2013.24"},{"year":"0","key":"ref4","article-title":"Ninth Annual Cost if Cybercrime Study unlocking The Value of Improved Cybersecurity Protection. The Cost of Cybercrime Contents"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50194-9_4"},{"key":"ref3","article-title":"An ontology-based approach to model common vulnerabilities and exposures in information security","author":"guo","year":"2009","journal-title":"ASEE Southest Section Conference"},{"key":"ref6","first-page":"869","article-title":"Towards the detection of inconsistencies in public security vulnerability reports","author":"dong","year":"2019","journal-title":"28th USENIX Security Symposium (USENIX Security 19)"},{"key":"ref29","article-title":"tweepy documentation","volume":"5","author":"roesslein","year":"2009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587374"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2019.00058"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.28.230"},{"article-title":"Automatic identification of indicators of compromise using neural-based sequence labelling","year":"2018","author":"zhou","key":"ref2"},{"year":"2019","key":"ref9","article-title":"Privacy Rights Clearinghouse Data Breaches"},{"article-title":"Crawling Deep Web using a GA-based set covering algorithm","year":"2010","author":"wang","key":"ref1"},{"key":"ref20","article-title":"Phone Numbers of Millions of Facebook Users Exposed Online","author":"cisomag","year":"2019","journal-title":"CISO MAG &#x2014; Cyber Security Magazine"},{"article-title":"Computerization and controversy: Value conflicts and social choices","year":"1996","author":"kling","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2020.05.007"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/13600869.1995.9966418"},{"key":"ref23","first-page":"196","article-title":"Cyber crime and legal countermeasures: A historical analysis","volume":"12","author":"li","year":"2017","journal-title":"International Journal Of Criminal Justice Sciences"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10611-016-9644-4"},{"journal-title":"2nd Appellate Dist 2008 - Google Scholar","article-title":"2008 Ohio 2243 - Ohio: Court of Appeals","year":"0","key":"ref25"}],"event":{"name":"2020 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2020,12,10]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2020,12,13]]}},"container-title":["2020 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9377717\/9377728\/09378220.pdf?arnumber=9378220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T11:47:24Z","timestamp":1656330444000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9378220\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/bigdata50022.2020.9378220","relation":{},"subject":[],"published":{"date-parts":[[2020,12,10]]}}}