{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:27:50Z","timestamp":1729614470001,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/cybersa.2016.7503294","type":"proceedings-article","created":{"date-parts":[[2016,7,4]],"date-time":"2016-07-04T21:09:06Z","timestamp":1467666546000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Instant message classification in Finnish cyber security themed free-form discussion"],"prefix":"10.1109","author":[{"given":"Samir","family":"Puuska","sequence":"first","affiliation":[]},{"given":"Matti J.","family":"Kortelainen","sequence":"additional","affiliation":[]},{"given":"Viljami","family":"Venekoski","sequence":"additional","affiliation":[]},{"given":"Jouko","family":"Vankka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Kyberharjoitus alkaa Jyv&#x00E4;skyl&#x00E4;ss&#x00E4; [Cyber security exercise begins in Jyv&#x00E4;skyl&#x00E4;]. Newspaper article","year":"2015","author":"halminen","key":"ref10"},{"journal-title":"Jyv&#x00E4;skyl&#x00E4; Security Technology","article-title":"National cyber exercise 2015 focuses on security network environment. Accessed 02\/23\/2016","year":"2015","key":"ref11"},{"journal-title":"Multinational Alliance for Collaborative Cyber Situational Awareness","year":"2013","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-013-9244-1"},{"journal-title":"Finite State Morphology","year":"2003","author":"beesley","key":"ref14"},{"key":"ref15","article-title":"Weighted Finite-State Methods for Spell-Checking and Correction","author":"pirinen","year":"2014","journal-title":"Helsinki Helsinki University of Technology"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/183422.183424"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/11494683_28"},{"key":"ref19","first-page":"616","article-title":"Tackling the poor assumptions of naive Bayes text classifiers","volume":"3","author":"rennie","year":"2003","journal-title":"Proceedings of the Twentieth InternationalConference on Machine Learning (ICML 2003)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1108\/14684520610706398"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1177\/1071181311551099"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2008.61"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/ICSC.2007.55","article-title":"Lexical and discourse analysis of online chat dialog","author":"forsyth","year":"2007","journal-title":"IEEE Int Conf Semant computing"},{"key":"ref8","first-page":"50","article-title":"Untangling topic threads in chat-based communication: A case study","author":"ramachandran","year":"2011","journal-title":"Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence AAAI Publications"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.053"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1177\/154193120605000403"},{"key":"ref9","first-page":"141","article-title":"Software newsroom &#x2013; an approach to automation of news search and editing","volume":"2","author":"huovelin","year":"2013","journal-title":"J Print Media Technol Res"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.452"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45014-9_1"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1007\/11569596_63","author":"\u00f6zg\u00fcr","year":"2005","journal-title":"Computer and Information Sciences - ISCIS 2005 20th International Symposium"},{"key":"ref21","first-page":"112","author":"van rijsbergen","year":"1979","journal-title":"Information Retrieval"},{"key":"ref24","first-page":"532","article-title":"Encyclopedia of database systems","author":"refaeilzadeh","year":"2009","journal-title":"Cross-validation"},{"journal-title":"MATLAB and Statistics and Machine Learning Toolbox Release R2013a","year":"2013","key":"ref23"},{"article-title":"Project Gutenberg. Accessed 12\/16\/2015","year":"0","author":"hart","key":"ref25"}],"event":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","start":{"date-parts":[[2016,6,13]]},"location":"London, United Kingdom","end":{"date-parts":[[2016,6,14]]}},"container-title":["2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7499673\/7503275\/07503294.pdf?arnumber=7503294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T02:17:10Z","timestamp":1718677030000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7503294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2016.7503294","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}