{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T14:37:36Z","timestamp":1775140656625,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,16]],"date-time":"2021-01-16T00:00:00Z","timestamp":1610755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Key R&D program of China","award":["2017YFC080700, 2016YFE0206700"],"award-info":[{"award-number":["2017YFC080700, 2016YFE0206700"]}]},{"name":"Sichuan Science and Technology Program","award":["19ZDYF1987"],"award-info":[{"award-number":["19ZDYF1987"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,16]]},"DOI":"10.1145\/3451471.3451508","type":"proceedings-article","created":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T22:20:59Z","timestamp":1626214859000},"page":"236-242","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Joint BERT Model based Cybersecurity Named Entity Recognition"],"prefix":"10.1145","author":[{"given":"YuXuan","family":"Chen","sequence":"first","affiliation":[{"name":"30th Research Institute of China Electronics, China"}]},{"given":"Jianwei","family":"Ding","sequence":"additional","affiliation":[{"name":"30th Research Institute of China Electronics Technology Group Corporation, China"}]},{"given":"Dashuang","family":"Li","sequence":"additional","affiliation":[{"name":"30th Research Institute of China Electronics Technology Group Corporation, China"}]},{"given":"Zhouguo","family":"Chen","sequence":"additional","affiliation":[{"name":"30th Research Institute of China Electronics Technology Group Corporation, China"}]}],"member":"320","published-online":{"date-parts":[[2021,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"29","volume-title":"The Seventh IEEE Conference on Artificial Intelligence Application","volume":"1","author":"Rau Lisa F","year":"1991"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978315"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19686-2_1"},{"key":"e_1_3_2_1_4_1","volume-title":"a high-performance learning name-finder.\" arXiv preprint cmp-lg\/9803003","author":"Bikel Daniel M","year":"1998"},{"key":"e_1_3_2_1_5_1","unstructured":"Sekine Satoshi Ralph Grishman and Hiroyuki Shinnou. \"A decision tree method for finding and classifying names in Japanese texts.\" In Sixth workshop on very large corpora. 1998.  Sekine Satoshi Ralph Grishman and Hiroyuki Shinnou. \"A decision tree method for finding and classifying names in Japanese texts.\" In Sixth workshop on very large corpora. 1998."},{"key":"e_1_3_2_1_6_1","unstructured":"Borthwick Andrew John Sterling Eugene Agichtein and Ralph Grishman. \"Exploiting diverse knowledge sources via maximum entropy in named entity recognition.\" In Sixth Workshop on Very Large Corpora. 1998.  Borthwick Andrew John Sterling Eugene Agichtein and Ralph Grishman. \"Exploiting diverse knowledge sources via maximum entropy in named entity recognition.\" In Sixth Workshop on Very Large Corpora. 1998."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3115\/1075178.1075215"},{"key":"e_1_3_2_1_8_1","volume-title":"feature induction and web-enhanced lexicons","author":"McCallum Andrew","year":"2003"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00104"},{"key":"e_1_3_2_1_10_1","unstructured":"Huang Zhiheng Wei Xu and Kai Yu. \"Bidirectional LSTM-CRF models for sequence tagging.\" arXiv preprint arXiv:1508.01991 (2015).  Huang Zhiheng Wei Xu and Kai Yu. \"Bidirectional LSTM-CRF models for sequence tagging.\" arXiv preprint arXiv:1508.01991 (2015)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Strubell Emma Patrick Verga David Belanger and Andrew McCallum. \"Fast and accurate entity recognition with iterated dilated convolutions.\" arXiv preprint arXiv:1702.02098 (2017).  Strubell Emma Patrick Verga David Belanger and Andrew McCallum. \"Fast and accurate entity recognition with iterated dilated convolutions.\" arXiv preprint arXiv:1702.02098 (2017).","DOI":"10.18653\/v1\/D17-1283"},{"key":"e_1_3_2_1_12_1","volume-title":"Pre-training of deep bidirectional transformers for language understanding.\" arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2013.50"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2018.01.004"},{"key":"e_1_3_2_1_15_1","volume-title":"Information Extraction of cyber security related terms and concepts from unstructured text","author":"Lal Ravendar","year":"2013"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2011.26"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746277"},{"key":"e_1_3_2_1_18_1","volume-title":"\"Automatic labeling for entity extraction in cyber security.\" arXiv preprint arXiv:1308.4941","author":"Bridges Robert A","year":"2013"},{"key":"e_1_3_2_1_19_1","first-page":"2018","article-title":"LSTM recurrent neural networks for cybersecurity named entity recognition","volume":"11","author":"Gasmi Houssem","year":"2018","journal-title":"ICSEA"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1800520"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2019.00039"}],"event":{"name":"ICSIM 2021: 2021 The 4th International Conference on Software Engineering and Information Management","location":"Yokohama Japan","acronym":"ICSIM 2021"},"container-title":["2021 The 4th International Conference on Software Engineering and Information Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3451471.3451508","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3451471.3451508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:59Z","timestamp":1750197779000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3451471.3451508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,16]]},"references-count":21,"alternative-id":["10.1145\/3451471.3451508","10.1145\/3451471"],"URL":"https:\/\/doi.org\/10.1145\/3451471.3451508","relation":{},"subject":[],"published":{"date-parts":[[2021,1,16]]},"assertion":[{"value":"2021-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}