{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:38:52Z","timestamp":1775666332446,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,20]]},"DOI":"10.1109\/icnc57223.2023.10074187","type":"proceedings-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T17:39:46Z","timestamp":1679593186000},"page":"436-442","source":"Crossref","is-referenced-by-count":8,"title":["AI-based Cyber Event OSINT via Twitter Data"],"prefix":"10.1109","author":[{"given":"Dakota","family":"Dale","sequence":"first","affiliation":[{"name":"University of Arkansas"}]},{"given":"Kylie","family":"McClanahan","sequence":"additional","affiliation":[{"name":"University of Arkansas"}]},{"given":"Qinghua","family":"Li","sequence":"additional","affiliation":[{"name":"University of Arkansas"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Microsoft Security Shocker As 250 Million Customer Records Exposed Online","author":"Winder"},{"key":"ref2","volume-title":"\u2019Jugular\u2019 of the U.S. fuel pipeline system shuts down after cyberattack","author":"Gonzalez"},{"key":"ref3","volume-title":"2022 SonicWall Cyber Threat Report","year":"2022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.11610\/isij.4703"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5604\/01.3001.0012.1474"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2017.080305"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191528"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.28.230"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752338"},{"key":"ref10","first-page":"220","article-title":"Twitterosint: automated cybersecurity threat intelligence collection and analysis using twitter data","volume-title":"International Conference on Security and Management (SAM)","author":"Vadapalli"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3344379"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8852475"},{"issue":"12","key":"ref13","article-title":"Twitter sentiment classification using distant supervision","volume-title":"CS224N project report","volume":"1","author":"Go","year":"2009"},{"issue":"2015","key":"ref14","article-title":"Adapting sentiment analysis for tweets linking to scientific papers","volume":"abs\/1507.01967","author":"Friedrich","journal-title":"CoRR"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4236\/jdaip.2020.84018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INISTA.2013.6577649"},{"key":"ref17","volume-title":"Predicting US Political Party Affiliation on Twitter","author":"Lee","year":"2018"},{"key":"ref18","article-title":"Predicting Consumers\u2019 Brand Sentiment Using Text Analysis on Reddit","author":"Cen","year":"2020","journal-title":"undergraduate"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/s12864-021-08239-0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOMP.2016.7425811"},{"key":"ref21","volume-title":"Cisco urges admins to patch IOS XR zero-day exploited in attacks","author":"Gatlan","year":"2022"},{"key":"ref22","volume-title":"Security Bulletin 08 Jun 2022","year":"2022"},{"key":"ref23","volume-title":"Security Bulletin 25 May 2022","year":"2022"},{"key":"ref24","article-title":"The Race to the Vulnerable: Measuring the Log4j Shell Incident","author":"Hiesgen","year":"2022"},{"key":"ref25","volume-title":"Hackers used the Log4j flaw to gain access before moving across a company\u2019s network, say security researchers"},{"key":"ref26","volume-title":"North Korea-linked Lazarus APT uses Log4J to target VMware servers","author":"Paganini"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470039"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm47815.2020.9303019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162309"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90019-9_4"}],"event":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","location":"Honolulu, HI, USA","start":{"date-parts":[[2023,2,20]]},"end":{"date-parts":[[2023,2,22]]}},"container-title":["2023 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10073968\/10073976\/10074187.pdf?arnumber=10074187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T07:03:10Z","timestamp":1709449390000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10074187\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icnc57223.2023.10074187","relation":{},"subject":[],"published":{"date-parts":[[2023,2,20]]}}}