{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T04:26:52Z","timestamp":1769920012083,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384721","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"665-678","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Cybersecurity Event Detection with New and Re-emerging Words"],"prefix":"10.1145","author":[{"given":"Hyejin","family":"Shin","sequence":"first","affiliation":[{"name":"Samsung Research, Seoul, Republic of Korea"}]},{"given":"WooChul","family":"Shim","sequence":"additional","affiliation":[{"name":"Samsung Research, Seoul, Republic of Korea"}]},{"given":"Jiin","family":"Moon","sequence":"additional","affiliation":[{"name":"Samsung Research, Seoul, Republic of Korea"}]},{"given":"Jae Woo","family":"Seo","sequence":"additional","affiliation":[{"name":"Samsung Research, Seoul, Republic of Korea"}]},{"given":"Sol","family":"Lee","sequence":"additional","affiliation":[{"name":"Samsung Research, Seoul, Republic of Korea"}]},{"given":"Yong Ho","family":"Hwang","sequence":"additional","affiliation":[{"name":"Samsung Research, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. Statistical hypothesis testing. https:\/\/en.wikipedia.org\/wiki\/Statistical_hypothesis_testing.  [n.d.]. Statistical hypothesis testing. https:\/\/en.wikipedia.org\/wiki\/Statistical_hypothesis_testing."},{"key":"e_1_3_2_2_2_1","unstructured":"2009. Evaluation of clustering. https:\/\/nlp.stanford.edu\/IR-book\/html\/htmledition\/evaluation-of-clustering-1.html.  2009. Evaluation of clustering. https:\/\/nlp.stanford.edu\/IR-book\/html\/htmledition\/evaluation-of-clustering-1.html."},{"key":"e_1_3_2_2_3_1","volume-title":"RSA Conference: Top 25 infosec leaders to follow on Twitter. https:\/\/techbeacon.com\/rsa-conference-top-25-infosec-leaders-follow-twitter.","unstructured":"2016. RSA Conference: Top 25 infosec leaders to follow on Twitter. https:\/\/techbeacon.com\/rsa-conference-top-25-infosec-leaders-follow-twitter. 2016. RSA Conference: Top 25 infosec leaders to follow on Twitter. https:\/\/techbeacon.com\/rsa-conference-top-25-infosec-leaders-follow-twitter."},{"key":"e_1_3_2_2_4_1","unstructured":"2016. Security experts you need to follow. https:\/\/www.securityinnovationeurope.com\/blog\/page\/security-experts-you-need-follow.  2016. Security experts you need to follow. https:\/\/www.securityinnovationeurope.com\/blog\/page\/security-experts-you-need-follow."},{"key":"e_1_3_2_2_5_1","unstructured":"2018. 2018 Internet Security Threat Report. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-23-executive-summary-en.pdf.  2018. 2018 Internet Security Threat Report. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-23-executive-summary-en.pdf."},{"key":"e_1_3_2_2_6_1","volume-title":"Revealed: The 21 biggest data breaches of","year":"2018","unstructured":"2018. Revealed: The 21 biggest data breaches of 2018 . https:\/\/www.digitalinformationworld.com\/2018\/12\/biggest-data-breaches-of-2018.html. 2018. Revealed: The 21 biggest data breaches of 2018. https:\/\/www.digitalinformationworld.com\/2018\/12\/biggest-data-breaches-of-2018.html."},{"key":"e_1_3_2_2_7_1","unstructured":"2019. Best Buy: Shop all brands. https:\/\/www.bestbuy.com\/.  2019. Best Buy: Shop all brands. https:\/\/www.bestbuy.com\/."},{"key":"e_1_3_2_2_8_1","unstructured":"2019. Common Attack Pattern Enumeration and Classification. https:\/\/capec.mitre.org\/data\/definitions\/1000.html.  2019. Common Attack Pattern Enumeration and Classification. https:\/\/capec.mitre.org\/data\/definitions\/1000.html."},{"key":"e_1_3_2_2_9_1","unstructured":"2019. Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/.  2019. Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/."},{"key":"e_1_3_2_2_10_1","unstructured":"2019. Common Weakness Enumeration. https:\/\/cwe.mitre.org\/data\/definitions\/1000.html.  2019. Common Weakness Enumeration. https:\/\/cwe.mitre.org\/data\/definitions\/1000.html."},{"key":"e_1_3_2_2_11_1","unstructured":"2019. Consumer Reports Top Products. https:\/\/www.consumerreports.org\/appliances\/.  2019. Consumer Reports Top Products. https:\/\/www.consumerreports.org\/appliances\/."},{"key":"e_1_3_2_2_12_1","unstructured":"2019. ENISA Threat Taxonomy. https:\/\/www.enisa.europa.eu\/topics\/threat-risk-management\/threats-and-trends\/enisa-threat-landscape\/threat-taxonomy\/view.  2019. ENISA Threat Taxonomy. https:\/\/www.enisa.europa.eu\/topics\/threat-risk-management\/threats-and-trends\/enisa-threat-landscape\/threat-taxonomy\/view."},{"key":"e_1_3_2_2_13_1","unstructured":"2019. Fortune 500 Companies 2018. http:\/\/fortune.com\/global500\/.  2019. Fortune 500 Companies 2018. http:\/\/fortune.com\/global500\/."},{"key":"e_1_3_2_2_14_1","unstructured":"2019. Hackmageddon. https:\/\/www.hackmageddon.com\/.  2019. Hackmageddon. https:\/\/www.hackmageddon.com\/."},{"key":"e_1_3_2_2_15_1","volume-title":"Kaspersky Lab DDoS Reports: DDoS Attacks","year":"2018","unstructured":"2019. Kaspersky Lab DDoS Reports: DDoS Attacks in 2018 . https:\/\/securelist.com\/. 2019. Kaspersky Lab DDoS Reports: DDoS Attacks in 2018. https:\/\/securelist.com\/."},{"key":"e_1_3_2_2_16_1","unstructured":"2019. NVD CPE dictionary. https:\/\/nvd.nist.gov\/products\/cpe.  2019. NVD CPE dictionary. https:\/\/nvd.nist.gov\/products\/cpe."},{"key":"e_1_3_2_2_17_1","unstructured":"2019.Popular jQuery JavaScript library impacted by prototype pollution flaw. https:\/\/www.zdnet.com\/article\/popular-jquery-javascript-library-impacted-by-prototype-pollution-flaw\/.  2019.Popular jQuery JavaScript library impacted by prototype pollution flaw. https:\/\/www.zdnet.com\/article\/popular-jquery-javascript-library-impacted-by-prototype-pollution-flaw\/."},{"key":"e_1_3_2_2_18_1","unstructured":"2019. Recorded Future. https:\/\/www.recordedfuture.com\/.  2019. Recorded Future. https:\/\/www.recordedfuture.com\/."},{"key":"e_1_3_2_2_19_1","unstructured":"2019. Structured Threat Information eXpression (STIX) 1.x Archive Website. https:\/\/stixproject.github.io.  2019. Structured Threat Information eXpression (STIX) 1.x Archive Website. https:\/\/stixproject.github.io."},{"key":"e_1_3_2_2_20_1","unstructured":"2019. Twitter Security Events. http:\/\/kb1.cse.ohio-state.edu:8123\/events\/hacked.  2019. Twitter Security Events. http:\/\/kb1.cse.ohio-state.edu:8123\/events\/hacked."},{"key":"e_1_3_2_2_21_1","unstructured":"2019. Vulnerabilities Articles from Snyk. https:\/\/snyk.io\/blog\/category\/vulnerabilities\/.  2019. Vulnerabilities Articles from Snyk. https:\/\/snyk.io\/blog\/category\/vulnerabilities\/."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12017"},{"key":"e_1_3_2_2_23_1","volume-title":"The semantic web","author":"Auer S\u00f6ren","unstructured":"S\u00f6ren Auer , Christian Bizer , Georgi Kobilarov , Jens Lehmann , Richard Cyganiak ,and Zachary Ives . 2007. DBpedia: A nucleus for a web of open data . In The semantic web . Springer , 722--735. S\u00f6ren Auer, Christian Bizer, Georgi Kobilarov, Jens Lehmann, Richard Cyganiak,and Zachary Ives. 2007. DBpedia: A nucleus for a web of open data. In The semantic web. Springer, 722--735."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330689"},{"key":"e_1_3_2_2_25_1","volume-title":"Proceedings of the 31st international conference on Very large data bases. VLDB Endowment, 181--192","author":"Cheong Fung Gabriel Pui","year":"2005","unstructured":"Gabriel Pui Cheong Fung , Jeffrey Xu Yu , Philip S Yu , and Hongjun Lu . 2005 . Parameter free bursty events detection in text streams . In Proceedings of the 31st international conference on Very large data bases. VLDB Endowment, 181--192 . Gabriel Pui Cheong Fung, Jeffrey Xu Yu, Philip S Yu, and Hongjun Lu. 2005. Parameter free bursty events detection in text streams. In Proceedings of the 31st international conference on Very large data bases. VLDB Endowment, 181--192."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277779"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132866"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775061"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098992"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.3115\/1118108.1118117"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-5010"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807306"},{"key":"e_1_3_2_2_33_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013.Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111--3119.  Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013.Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111--3119."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752338"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the 2013 conference of the North American chapter of the association for computational linguistics: human language technologies. 380--390","author":"Owoputi Olutobi","year":"2013","unstructured":"Olutobi Owoputi , Brendan O'Connor , Chris Dyer , Kevin Gimpel , Nathan Schneider , and Noah A Smith . 2013 . Improved part-of-speech tagging for online conversational text with word clusters . In Proceedings of the 2013 conference of the North American chapter of the association for computational linguistics: human language technologies. 380--390 . Olutobi Owoputi, Brendan O'Connor, Chris Dyer, Kevin Gimpel, Nathan Schneider, and Noah A Smith. 2013. Improved part-of-speech tagging for online conversational text with word clusters. In Proceedings of the 2013 conference of the North American chapter of the association for computational linguistics: human language technologies. 380--390."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1202"},{"key":"e_1_3_2_2_38_1","volume-title":"Human language technologies: The 2010 annual conference of the North American","author":"Osborne Miles","unstructured":"Miles Osborne , and Victor Lavrenko . 2010. Streaming first story detection with application to twitter . In Human language technologies: The 2010 annual conference of the North American chapter of the association for computational linguistics. Association for Computational Linguistics , 181--189. Miles Osborne, and Victor Lavrenko. 2010. Streaming first story detection with application to twitter. In Human language technologies: The 2010 annual conference of the North American chapter of the association for computational linguistics. Association for Computational Linguistics, 181--189."},{"key":"e_1_3_2_2_39_1","volume-title":"Proceedings of the conference on empirical methods in natural language processing. Association for Computational Linguistics, 1524--1534","author":"Ritter Alan","unstructured":"Alan Ritter , Sam Clark , Oren Etzioni , Named entity recognition in tweets: an experimental study . In Proceedings of the conference on empirical methods in natural language processing. Association for Computational Linguistics, 1524--1534 . Alan Ritter, Sam Clark, Oren Etzioni, et al.2011. Named entity recognition in tweets: an experimental study. In Proceedings of the conference on empirical methods in natural language processing. Association for Computational Linguistics, 1524--1534."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741083"},{"key":"e_1_3_2_2_41_1","volume-title":"Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits. In USENIX Security Symposium. 1041--1056","author":"Sabottke Carl","year":"2015","unstructured":"Carl Sabottke , Octavian Suciu , and Tudor Dumitras . 2015 . Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits. In USENIX Security Symposium. 1041--1056 . Carl Sabottke, Octavian Suciu, and Tudor Dumitras. 2015. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits. In USENIX Security Symposium. 1041--1056."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772777"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.29"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191528"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0019467"},{"key":"e_1_3_2_2_46_1","volume-title":"AAAI Workshop: Artificial Intelligence for Cyber Security.","author":"Syed Zareen","year":"2016","unstructured":"Zareen Syed , Ankur Padia , Tim Finin , M Lisa Mathews , and Anupam Joshi . 2016 . UCO: A Unified Cybersecurity Ontology . In AAAI Workshop: Artificial Intelligence for Cyber Security. Zareen Syed, Ankur Padia, Tim Finin, M Lisa Mathews, and Anupam Joshi. 2016.UCO: A Unified Cybersecurity Ontology. In AAAI Workshop: Artificial Intelligence for Cyber Security."},{"key":"e_1_3_2_2_47_1","volume-title":"Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media. 401--408","author":"Weng Jianshu","year":"2011","unstructured":"Jianshu Weng and Bu-Sung Lee . 2011 . Event detection in twitter . In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media. 401--408 . Jianshu Weng and Bu-Sung Lee. 2011. Event detection in twitter. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media. 401--408."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0320-3"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1140"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"ASIA CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384721","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384721","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:27Z","timestamp":1750200087000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384721"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":49,"alternative-id":["10.1145\/3320269.3384721","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384721","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}