{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T06:08:22Z","timestamp":1775628502329,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1109\/icmla66185.2025.00163","type":"proceedings-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T19:54:58Z","timestamp":1775591698000},"page":"1064-1069","source":"Crossref","is-referenced-by-count":0,"title":["Event Detection in Dark Web and Surface Web Forums using Machine Learning"],"prefix":"10.1109","author":[{"given":"Rodrigo Bernab\u00e9","family":"Silveira","sequence":"first","affiliation":[{"name":"Federal University of Uberl&#x00E2;ndia (UFU),Faculty of Computing (FACOM),Uberl&#x00E2;ndia,Brazil"}]},{"given":"Rodrigo","family":"Sanches Miani","sequence":"additional","affiliation":[{"name":"Federal University of Uberl&#x00E2;ndia (UFU),Faculty of Computing (FACOM),Uberl&#x00E2;ndia,Brazil"}]},{"given":"Paulo Henrique","family":"Ribeiro Gabriel","sequence":"additional","affiliation":[{"name":"Federal University of Uberl&#x00E2;ndia (UFU),Faculty of Computing (FACOM),Uberl&#x00E2;ndia,Brazil"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1041","article-title":"Vulnerability disclosure in the age of social media: Exploiting Twitter for predicting real-world exploits","volume-title":"Proceedings of the 24th USENIX Security Symposium","author":"Sabottke"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.94"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3344379"},{"key":"ref4","article-title":"Deep learning algorithm for threat detection in hackers forum (deep web)","author":"Adewopo","year":"2022"},{"key":"ref5","article-title":"Discovering signals from web sources to predict cyber attacks","author":"Goyal","year":"2018"},{"key":"ref6","article-title":"Detection of malicious posts on the dark web using supervised machine learning","volume-title":"Master\u2019s thesis","author":"Jesus Filho","year":"2024"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.18653\/v1\/D19-1410","article-title":"Sentence-bert: Sentence embeddings using siamese bert-networks","volume-title":"CoRR","author":"Reimers","year":"2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3447654.3447657"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISI49825.2020.9280540"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32010-6_461"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2015.7165944"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5120\/14937-3507"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1017\/pan.2017.44"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2265-0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098992"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.157"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2675839"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-018-9828-9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2018.03.001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ASYU56188.2022.9925501"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC57223.2023.10074187"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.wnut-1.15"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191528"},{"key":"ref25","article-title":"Tweezers: A framework for security event detection via event attribution-centric tweetembedding","author":"Cui","year":"2024"},{"key":"ref26","article-title":"Topic detection and tracking pilot study final report","author":"Allan","year":"1998","journal-title":"Carnegie Mellon University, Tech. Rep."},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37456-2_14"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"ref29","article-title":"Darkpt-br: Labeled posts from brazilian portuguese dark web forums","author":"Miani","year":"2025"}],"event":{"name":"2025 International Conference on Machine Learning and Applications (ICMLA)","location":"Boca Raton, FL, USA","start":{"date-parts":[[2025,12,3]]},"end":{"date-parts":[[2025,12,5]]}},"container-title":["2025 International Conference on Machine Learning and Applications (ICMLA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471302\/11471304\/11471401.pdf?arnumber=11471401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:31:20Z","timestamp":1775626280000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icmla66185.2025.00163","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]}}}