{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:37Z","timestamp":1772039497431,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/fskd.2017.8393106","type":"proceedings-article","created":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T22:38:33Z","timestamp":1531780713000},"page":"2161-2168","source":"Crossref","is-referenced-by-count":7,"title":["Towards a two-phase unsupervised system for cybersecurity concepts extraction"],"prefix":"10.1109","author":[{"given":"Zhifeng","family":"Xiao","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"3111","article-title":"Distributed representations of words and phrases and their composition-ality","author":"mikolov","year":"2013","journal-title":"Advances in neural information processing systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2007100101"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2012.07.001"},{"key":"ref13","author":"honnibal","year":"0","journal-title":"spaCy"},{"key":"ref14","author":"baldridge","year":"0","journal-title":"The OpenNLP project"},{"key":"ref15","year":"0","journal-title":"Top 50 cyber security blogs for it security pros"},{"key":"ref16","author":"rehurek","year":"2011","journal-title":"Gensim - statistical semantics in python"},{"key":"ref17","article-title":"Uco: A unified cybersecurity ontology","author":"syed","year":"2016","journal-title":"Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746278"},{"key":"ref19","first-page":"722","article-title":"Dbpedia: A nucleus for a web of open data","author":"auer","year":"2007","journal-title":"The Semantic Web 6th International Semantic Web Conference 2nd Asian Semantic Web Conference ISWC 2007 + ASWC 2007"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746277"},{"key":"ref4","first-page":"188","article-title":"Asu: An experimental study on applying deep learning in twitter named entity recognition","author":"gerguis","year":"2016","journal-title":"WNUT 2016"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2013.50"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1030"},{"key":"ref6","author":"bridges","year":"2013","journal-title":"Automatic labeling for entity extraction in cyber security"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3115\/1119176.1119181"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.75"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741083"},{"key":"ref7","first-page":"356","article-title":"Automated extraction of vulnerability information for home computer security","author":"weerawardhana","year":"2014","journal-title":"Intemationsal Symposium on Foundations and Practice of Security"},{"key":"ref2","author":"passos","year":"2014","journal-title":"Lexicon infused phrase embeddings for named entity resolution"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2013.106"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3115\/1219840.1219885"},{"key":"ref20","year":"0","journal-title":"Freebase"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1075\/li.30.1.03nad","article-title":"A survey of named entity recognition and classification","volume":"30","author":"nadeau","year":"2007","journal-title":"Lingvisticae Investigationes"},{"key":"ref21","first-page":"697","article-title":"Yago:a core of semantic knowledge","author":"suchanek","year":"2007","journal-title":"International World Wide Web Conference WWW'2007"},{"key":"ref24","article-title":"Cross-domain bootstrapping for named entity recognition","author":"sun","year":"2011","journal-title":"Proceedings of Sigir Workshop on Entity"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3115\/1699648.1699699"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P15-2048"},{"key":"ref25","article-title":"Fine-grained entity recognition","author":"ling","year":"2012","journal-title":"Twenty-Sixth AAAI Conference on Artificial Intelligence"}],"event":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","location":"Guilin","start":{"date-parts":[[2017,7,29]]},"end":{"date-parts":[[2017,7,31]]}},"container-title":["2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8384043\/8392854\/08393106.pdf?arnumber=8393106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:54:13Z","timestamp":1598241253000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8393106\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/fskd.2017.8393106","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}