{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:44:28Z","timestamp":1730274268683,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1109\/isi58743.2023.10297274","type":"proceedings-article","created":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T18:02:18Z","timestamp":1698861738000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Context-Augmented Key Phrase Extraction from Short Texts for Cyber Threat Intelligence Tasks"],"prefix":"10.1109","author":[{"given":"Avishek","family":"Bose","sequence":"first","affiliation":[{"name":"Kansas State University,Department of Computer Science,Manhattan,Kansas,USA"}]},{"given":"Huichen","family":"Yang","sequence":"additional","affiliation":[{"name":"Kansas State University,Department of Computer Science,Manhattan,Kansas,USA"}]},{"given":"Marissa","family":"Shivers","sequence":"additional","affiliation":[{"name":"Kansas State University,Department of Computer Science,Manhattan,Kansas,USA"}]},{"given":"Ahat","family":"Orazgeldiyev","sequence":"additional","affiliation":[{"name":"Kansas State University,Department of Industrial and Manufacturing Systems Engineering,Manhattan,Kansas,USA"}]},{"given":"William H.","family":"Hsu","sequence":"additional","affiliation":[{"name":"Kansas State University,Department of Computer Science,Manhattan,Kansas,USA"}]}],"member":"263","reference":[{"key":"ref13","first-page":"147","article-title":"A self-attention-based approach for named entity recognition in cybersecurity","author":"tao","year":"2019","journal-title":"2019 15th International Conference on Computational Intelligence and Security (CIS) CIS"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"872","DOI":"10.1631\/FITEE.1800520","article-title":"A network security entity recognition method based on feature template and CNN-BiLSTM-CRF","volume":"20","author":"ya","year":"2019","journal-title":"Frontiers of Information Technology & Electronic Engineering"},{"key":"ref15","first-page":"1370","article-title":"An effective approach of named entity recognition for cyber threat intelligence","volume":"1","author":"han","year":"0","journal-title":"2020 IEEE 4th Information Technology Networking Electronic and Automation Control Conference (ITNEC)"},{"key":"ref14","article-title":"Automatic identification of indicators of compromise using neural-based sequence labelling","author":"shengping","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref20","first-page":"74","article-title":"Rouge: A package for automatic evaluation of summaries","author":"chin-yew","year":"2004","journal-title":"Text Summarization Branches Out"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"3380","DOI":"10.3390\/s19153380","article-title":"Named-entity-recognition-based automated system for diagnosing cybersecurity situations in IoT networks","volume":"19","author":"tiberiu-marian","year":"2019","journal-title":"SENSORS"},{"key":"ref10","first-page":"2018","article-title":"LSTM recurrent neural networks for cybersecurity named entity recognition","volume":"11","author":"houssem","year":"2018","journal-title":"ICSEA"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"211691","DOI":"10.1109\/ACCESS.2020.3039234","article-title":"Creating cybersecurity knowledge graphs from malware after action reports","volume":"8","author":"aritran","year":"2020","journal-title":"IEEE Access"},{"key":"ref1","first-page":"860","article-title":"Cybertwitter: Using twitter to generate alerts for cybersecurity threats and vulnerabilities","author":"sudip","year":"0","journal-title":"2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"3945","DOI":"10.3390\/app9193945","article-title":"Information extraction of cybersecurity concepts: an LSTM approach","volume":"9","author":"houssem","year":"2019","journal-title":"Applied Sciences"},{"key":"ref16","article-title":"Thinking, fast and slow: Combining vector spaces and knowledge graphs","author":"sudip","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622506"},{"key":"ref18","article-title":"Automatic labeling for entity extraction in cybersecurity","author":"robert","year":"2013","journal-title":"ArXiv Preprint"},{"key":"ref8","first-page":"1054","article-title":"Bond: Bert-assisted open-domain named entity recognition with distant supervision","author":"chen","year":"0","journal-title":"ACM SIGKDD International Conference on Knowledge Discovery and Data Mining"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.artint.2005.03.001","article-title":"Unsupervised named-entity extraction from the web: An experimental study","volume":"165","author":"oren","year":"2005","journal-title":"Artificial Intelligence"},{"key":"ref9","article-title":"Bidirectional LSTM-CRF models for sequence tagging","author":"zhiheng","year":"2015","journal-title":"ArXiv Preprint"},{"key":"ref4","article-title":"Named Entity Recognition from Synthesis Procedural Text in Materials Science Domain with Attention-Based Approach","author":"huichen","year":"2021","journal-title":"SDU AAAI"},{"key":"ref3","first-page":"1114","article-title":"Named entity recognition in information security domain for Russian","author":"anastasiia","year":"0","journal-title":"Proceedings of the International Conference on Recent Advances in Natural Language Processing (RANLP 2019)"},{"key":"ref6","first-page":"252","article-title":"Extracting cybersecurity related linked data from text","author":"arnav","year":"0","journal-title":"2013 IEEE Seventh International Conference on Semantic Computing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2011.26"}],"event":{"name":"2023 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2023,10,2]]},"location":"Charlotte, NC, USA","end":{"date-parts":[[2023,10,3]]}},"container-title":["2023 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10296974\/10297133\/10297274.pdf?arnumber=10297274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T19:30:50Z","timestamp":1701113450000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10297274\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,2]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isi58743.2023.10297274","relation":{},"subject":[],"published":{"date-parts":[[2023,10,2]]}}}