{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T17:21:02Z","timestamp":1774545662681,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,14]],"date-time":"2021-08-14T00:00:00Z","timestamp":1628899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,14]]},"DOI":"10.1145\/3447548.3467159","type":"proceedings-article","created":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T06:13:10Z","timestamp":1628748790000},"page":"2574-2583","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions"],"prefix":"10.1145","author":[{"given":"Hodaya","family":"Binyamini","sequence":"first","affiliation":[{"name":"Ben-Gurion University of the Negev, Be'er Sheva, Israel"}]},{"given":"Ron","family":"Bitton","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Be'er Sheva, Israel"}]},{"given":"Masaki","family":"Inokuchi","sequence":"additional","affiliation":[{"name":"NEC Corporation, Tokyo, Japan"}]},{"given":"Tomohiko","family":"Yagyu","sequence":"additional","affiliation":[{"name":"NEC Corporation, Tokyo, Japan"}]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Be'er Sheva, Israel"}]},{"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Be'er Sheva, Israel"}]}],"member":"320","published-online":{"date-parts":[[2021,8,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176339"},{"key":"e_1_3_2_1_3_1","volume-title":"A survey of word embeddings evaluation methods. arXiv preprint arXiv:1801.09536","author":"Bakarov Amir","year":"2018","unstructured":"Amir Bakarov . 2018. A survey of word embeddings evaluation methods. arXiv preprint arXiv:1801.09536 ( 2018 ). Amir Bakarov. 2018. A survey of word embeddings evaluation methods. arXiv preprint arXiv:1801.09536 (2018)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Yoshua Bengio Patrice Simard Paolo Frasconi etal 1994. Learning long-term dependencies with gradient descent is difficult. IEEE transactions on neural networks 5 2 (1994) 157--166.  Yoshua Bengio Patrice Simard Paolo Frasconi et al. 1994. Learning long-term dependencies with gradient descent is difficult. IEEE transactions on neural networks 5 2 (1994) 157--166.","DOI":"10.1109\/72.279181"},{"key":"e_1_3_2_1_5_1","volume-title":"Automatic labeling for entity extraction in cyber security. arXiv preprint arXiv:1308.4941","author":"Bridges Robert A","year":"2013","unstructured":"Robert A Bridges , Corinne L Jones , Michael D Iannacone , Kelly M Testa , and John R Goodall . 2013. Automatic labeling for entity extraction in cyber security. arXiv preprint arXiv:1308.4941 ( 2013 ). Robert A Bridges, Corinne L Jones, Michael D Iannacone, Kelly M Testa, and John R Goodall. 2013. Automatic labeling for entity extraction in cyber security. arXiv preprint arXiv:1308.4941 (2013)."},{"key":"e_1_3_2_1_6_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2018 . Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018). Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"key":"e_1_3_2_1_7_1","volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19). 869--885.","author":"Dong Ying","unstructured":"Ying Dong , Wenbo Guo , Yueqi Chen , Xinyu Xing , Yuqing Zhang , and GangWang. 2019. Towards the detection of inconsistencies in public security vulnerability reports . In 28th {USENIX} Security Symposium ({USENIX} Security 19). 869--885. Ying Dong,Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, and GangWang. 2019. Towards the detection of inconsistencies in public security vulnerability reports. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 869--885."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSET.2019.8904905"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329853"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2017.8227911"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746277"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01122-6"},{"key":"e_1_3_2_1_13_1","unstructured":"Ravendar Lal et al. 2013. Information Extraction of Security related entities and concepts from unstructured text. (2013).  Ravendar Lal et al. 2013. Information Extraction of Security related entities and concepts from unstructured text. (2013)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2019.00039"},{"key":"e_1_3_2_1_15_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Kai Chen , Greg Corrado , and Jeffrey Dean . 2013. Efficient estimation of word representations in vector space. arXiv preprint ( 2013 ). Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint (2013)."},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX security symposium","author":"Ou Xinming","unstructured":"Xinming Ou , Sudhakar Govindavajhala , and Andrew W Appel . 2005. MulVAL: A Logic-based Network Security Analyzer .. In USENIX security symposium , Vol. 8 . Baltimore , MD , 113--128. Xinming Ou, Sudhakar Govindavajhala, and Andrew W Appel. 2005. MulVAL: A Logic-based Network Security Analyzer.. In USENIX security symposium, Vol. 8. Baltimore, MD, 113--128."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_1_18_1","volume-title":"Deep contextualized word representations. arXiv preprint arXiv:1802.05365","author":"Peters Matthew E","year":"2018","unstructured":"Matthew E Peters , Mark Neumann , Mohit Iyyer , Matt Gardner , Christopher Clark , Kenton Lee , and Luke Zettlemoyer . 2018. Deep contextualized word representations. arXiv preprint arXiv:1802.05365 ( 2018 ). Matthew E Peters, Mark Neumann, Mohit Iyyer, Matt Gardner, Christopher Clark, Kenton Lee, and Luke Zettlemoyer. 2018. Deep contextualized word representations. arXiv preprint arXiv:1802.05365 (2018)."},{"key":"e_1_3_2_1_19_1","volume-title":"Named entity recognition: A literature survey","author":"Sharnagat Rahul","year":"2014","unstructured":"Rahul Sharnagat . 2014. Named entity recognition: A literature survey . Center For Indian Language Technology ( 2014 ). Rahul Sharnagat. 2014. Named entity recognition: A literature survey. Center For Indian Language Technology (2014)."},{"key":"e_1_3_2_1_20_1","volume-title":"Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security. In International Symposium on Signal Processing and Intelligent Recognition Systems. Springer, 163--172","author":"Simran K","year":"2019","unstructured":"K Simran , S Sriram , R Vinayakumar , and KP Soman . 2019 . Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security. In International Symposium on Signal Processing and Intelligent Recognition Systems. Springer, 163--172 . K Simran, S Sriram, R Vinayakumar, and KP Soman. 2019. Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security. In International Symposium on Signal Processing and Intelligent Recognition Systems. Springer, 163--172."},{"key":"e_1_3_2_1_21_1","volume-title":"Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. arXiv preprint arXiv:1906.09786","author":"Stan Orly","year":"2019","unstructured":"Orly Stan , Ron Bitton , Michal Ezrets , Moran Dadon , Masaki Inokuchi , Yoshinobu Ohta , Yoshiyuki Yamada , Tomohiko Yagyu , Yuval Elovici , and Asaf Shabtai . 2019. Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. arXiv preprint arXiv:1906.09786 ( 2019 ). Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, and Asaf Shabtai. 2019. Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. arXiv preprint arXiv:1906.09786 (2019)."},{"key":"e_1_3_2_1_22_1","volume-title":"International Symposium on Foundations and Practice of Security. Springer, 356--366","author":"Weerawardhana Sachini","year":"2014","unstructured":"Sachini Weerawardhana , Subhojeet Mukherjee , Indrajit Ray , and Adele Howe . 2014 . Automated extraction of vulnerability information for home computer security . In International Symposium on Foundations and Practice of Security. Springer, 356--366 . Sachini Weerawardhana, Subhojeet Mukherjee, Indrajit Ray, and Adele Howe. 2014. Automated extraction of vulnerability information for home computer security. In International Symposium on Foundations and Practice of Security. Springer, 356--366."},{"key":"e_1_3_2_1_23_1","volume-title":"A survey on recent advances in named entity recognition from deep learning models. arXiv preprint","author":"Yadav Vikas","year":"2019","unstructured":"Vikas Yadav and Steven Bethard . 2019. A survey on recent advances in named entity recognition from deep learning models. arXiv preprint ( 2019 ). Vikas Yadav and Steven Bethard. 2019. A survey on recent advances in named entity recognition from deep learning models. arXiv preprint (2019)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2035368.2035388"}],"event":{"name":"KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Virtual Event Singapore","acronym":"KDD '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467159","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447548.3467159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:27Z","timestamp":1750191507000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467159"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,14]]},"references-count":23,"alternative-id":["10.1145\/3447548.3467159","10.1145\/3447548"],"URL":"https:\/\/doi.org\/10.1145\/3447548.3467159","relation":{},"subject":[],"published":{"date-parts":[[2021,8,14]]},"assertion":[{"value":"2021-08-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}