{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T06:38:04Z","timestamp":1769841484476,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,26]]},"DOI":"10.1109\/csr51186.2021.9527964","type":"proceedings-article","created":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T21:35:06Z","timestamp":1630964106000},"page":"436-441","source":"Crossref","is-referenced-by-count":7,"title":["Social Media Monitoring for IoT Cyber-Threats"],"prefix":"10.1109","author":[{"given":"Sofia","family":"Alevizopoulou","sequence":"first","affiliation":[{"name":"University of the Peloponnese,Dept. of Informatics & Telecommunications,Tripolis,Greece,GR22131"}]},{"given":"Paris","family":"Koloveas","sequence":"additional","affiliation":[{"name":"University of the Peloponnese,Dept. of Informatics & Telecommunications,Tripolis,Greece,GR22131"}]},{"given":"Christos","family":"Tryfonopoulos","sequence":"additional","affiliation":[{"name":"University of the Peloponnese,Dept. of Informatics & Telecommunications,Tripolis,Greece,GR22131"}]},{"given":"Paraskevi","family":"Raftopoulou","sequence":"additional","affiliation":[{"name":"University of the Peloponnese,Dept. of Informatics & Telecommunications,Tripolis,Greece,GR22131"}]}],"member":"263","reference":[{"key":"ref31","author":"sch\u00fctze","year":"2008","journal-title":"Introduction to Information Retrieval"},{"key":"ref30","article-title":"Random forests","author":"breiman","year":"2001"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICInfA.2013.6720316"},{"key":"ref11","article-title":"Predicting software vulnerability using security discussion in social media","author":"queiroz","year":"2017","journal-title":"ECCWS"},{"key":"ref12","year":"0"},{"key":"ref13","year":"0"},{"key":"ref14","article-title":"The national vulnerability database (nvd): Overview","author":"booth","year":"2013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSA.2017.27"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2014.7049035"},{"key":"ref17","article-title":"Automatic classification method for software vulnerability based on deep neural network","author":"guoyan","year":"2019","journal-title":"IEEE"},{"key":"ref18","article-title":"Automatic vulnerability classification using machine learning","author":"gawron","year":"2017","journal-title":"CRiSIS"},{"key":"ref19","article-title":"Automated software vulnerability detection with machine learning","author":"harer","year":"2018"},{"key":"ref28","article-title":"An introduction to kernel and nearest-neighbor nonparametric regression","author":"altman","year":"1992","journal-title":"The American Statistician"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.94"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.11.024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2020.101586"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref5","article-title":"Cyber-twitter: Using twitter to generate alerts for cybersecurity threats and vulnerabilities","author":"mittal","year":"2016","journal-title":"IEEE\/ACM ASONAM"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2019.00058"},{"key":"ref7","article-title":"Vulnerability disclosure in the age of social media: Exploiting twitter for predicting real-world exploits","author":"sabottke","year":"2015","journal-title":"USENIX"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99828-2_15"},{"key":"ref9","author":"blinowski","year":"2020","journal-title":"CVE Based Classification of Vulnerable IoT Systems"},{"key":"ref1","article-title":"Understanding the internet of things (iot)","year":"2014","journal-title":"GSMA Conntected Living London"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2019.00016"},{"key":"ref22","article-title":"Scikit-learn: Machine learning in Python","author":"pedregosa","year":"2011","journal-title":"JMLR"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10070818"},{"key":"ref24","author":"mccullagh","year":"2018","journal-title":"Generalized Linear Models"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-4470-8_7"},{"key":"ref26","article-title":"An empirical study of the naive bayes classifier","author":"rish","year":"2001","journal-title":"IJCAI 2001 Workshop on Empirical Methods in Artificial Intelligence"},{"key":"ref25","article-title":"Bayes&#x2019; theorem","author":"james","year":"2003"}],"event":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Rhodes, Greece","start":{"date-parts":[[2021,7,26]]},"end":{"date-parts":[[2021,7,28]]}},"container-title":["2021 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9527731\/9527900\/09527964.pdf?arnumber=9527964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:29:32Z","timestamp":1659482972000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9527964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,26]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/csr51186.2021.9527964","relation":{},"subject":[],"published":{"date-parts":[[2021,7,26]]}}}