{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T06:09:55Z","timestamp":1773295795639,"version":"3.50.1"},"publisher-location":"Republic and Canton of Geneva, Switzerland","reference-count":44,"publisher":"International World Wide Web Conferences Steering Committee","license":[{"start":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T00:00:00Z","timestamp":1431907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Department of Defense","award":["FA8721-05-C-0003"],"award-info":[{"award-number":["FA8721-05-C-0003"]}]},{"name":"DARPA","award":["FA8750-13-2-0005"],"award-info":[{"award-number":["FA8750-13-2-0005"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,18]]},"DOI":"10.1145\/2736277.2741083","type":"proceedings-article","created":{"date-parts":[[2016,2,5]],"date-time":"2016-02-05T20:37:12Z","timestamp":1454704632000},"page":"896-905","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":88,"title":["Weakly Supervised Extraction of Computer Security Events from Twitter"],"prefix":"10.1145","author":[{"given":"Alan","family":"Ritter","sequence":"first","affiliation":[{"name":"Ohio State University, Columbus, OH, USA"}]},{"given":"Evan","family":"Wright","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"William","family":"Casey","sequence":"additional","affiliation":[{"name":"Software Engineering Institute Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Tom","family":"Mitchell","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,5,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/336597.336644"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124360"},{"key":"e_1_3_2_1_3_1","volume-title":"ACL","author":"Benson E.","year":"2011"},{"key":"e_1_3_2_1_4_1","unstructured":"B. Bishop. High-profile twitter account hijackings leave questions about security. web May 2013.  B. Bishop. High-profile twitter account hijackings leave questions about security. web May 2013."},{"key":"e_1_3_2_1_5_1","volume-title":"The World Wide Web and Databases.","author":"Brin S.","year":"1999"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2898607.2898816"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"F. Chierichetti J. Kleinberg R. Kumar M. Mahdian and S. Pandey. Event detection via communication pattern analysis. 2014.  F. Chierichetti J. Kleinberg R. Kumar M. Mahdian and S. Pandey. Event detection via communication pattern analysis. 2014.","DOI":"10.1609\/icwsm.v8i1.14536"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"B. Claise. RFC 3954 - Cisco Systems NetFlow Services Export Version 9 Oct. 2004.  B. Claise. RFC 3954 - Cisco Systems NetFlow Services Export Version 9 Oct. 2004.","DOI":"10.17487\/rfc3954"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401920"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488203"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1859918"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3115\/992628.992709"},{"key":"e_1_3_2_1_13_1","first-page":"239","volume-title":"ACL (1)","author":"Guo W.","year":"2013"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3115\/992133.992154"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.120"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2380816.2380853"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of ACL-08: HLT","author":"Ji H.","year":"2008"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2013.50"},{"key":"e_1_3_2_1_19_1","first-page":"448","volume-title":"ICML","volume":"3","author":"Lee W. S.","year":"2003"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348380"},{"key":"e_1_3_2_1_21_1","first-page":"587","volume-title":"IJCAI","author":"Li X.","year":"2003"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002472.2002519"},{"key":"e_1_3_2_1_23_1","first-page":"25","volume-title":"Proceedings of the ACL 2012 System Demonstrations","author":"Lui M.","year":"2012"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273571"},{"key":"e_1_3_2_1_25_1","first-page":"955","volume-title":"The Journal of Machine Learning Research","author":"Mann G. S.","year":"2010"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1690219.1690287"},{"key":"e_1_3_2_1_27_1","first-page":"13","volume-title":"WOSN'10","author":"Motoyama M.","year":"2010"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102168"},{"key":"e_1_3_2_1_29_1","first-page":"965","volume-title":"IJCNLP","author":"Neubig G.","year":"2011"},{"key":"e_1_3_2_1_30_1","volume-title":"Semi-Supervised Learning","author":"Nigam K.","year":"2006"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321440.1321536"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.3115\/1220175.1220190"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216373"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1857999.1858020"},{"key":"e_1_3_2_1_35_1","first-page":"1589","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing","author":"Qazvinian V.","year":"2011"},{"key":"e_1_3_2_1_36_1","unstructured":"K. Reschke M. Jankowiak M. Surdeanu C. D. Manning and D. Jurafsky. Event extraction using distant supervision. 2014.  K. Reschke M. Jankowiak M. Surdeanu C. D. Manning and D. Jurafsky. Event extraction using distant supervision. 2014."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2145432.2145595"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339704"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00234"},{"key":"e_1_3_2_1_40_1","volume-title":"LREC","author":"Roberts K.","year":"2012"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772777"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/1641484.1641485"},{"key":"e_1_3_2_1_44_1","volume-title":"ACL (2)","author":"Xu W.","year":"2013"}],"event":{"name":"WWW '15: 24th International World Wide Web Conference","location":"Florence Italy","acronym":"WWW '15","sponsor":["IW3C2 International World Wide Web Conference Committee","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 24th International Conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2736277.2741083","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2736277.2741083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:37Z","timestamp":1750227397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2736277.2741083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,18]]},"references-count":44,"alternative-id":["10.1145\/2736277.2741083","10.5555\/2736277"],"URL":"https:\/\/doi.org\/10.1145\/2736277.2741083","relation":{},"subject":[],"published":{"date-parts":[[2015,5,18]]},"assertion":[{"value":"2015-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}