{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T22:59:56Z","timestamp":1771455596080,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T00:00:00Z","timestamp":1637884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,26]]},"DOI":"10.1145\/3503823.3503888","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T22:15:51Z","timestamp":1645568151000},"page":"352-356","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Predicting the existence of exploitation concepts linked to software vulnerabilities using text mining"],"prefix":"10.1145","author":[{"given":"Konstantinos","family":"Charmanas","sequence":"first","affiliation":[{"name":"School of Informatics, Aristotle University of Thessaloniki, Greece"}]},{"given":"Nikolaos","family":"Mittas","sequence":"additional","affiliation":[{"name":"Department of Chemistry, International Hellenic University, Greece"}]},{"given":"Lefteris","family":"Angelis","sequence":"additional","affiliation":[{"name":"School of Informatics, Aristotle University of Thessaloniki, Greece"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The national vulnerability database (nvd): Overview","author":"Booth H.","year":"2013","unstructured":"Booth , H. , Rike , D. , & Witte , G. A. ( 2013 ). The national vulnerability database (nvd): Overview . Booth, H., Rike, D., & Witte, G. A. (2013). The national vulnerability database (nvd): Overview."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CYCONUS.2017.8167501"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835821"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0228439"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/qre.2754"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98842-9_4"},{"key":"e_1_3_2_1_7_1","volume-title":"International Conference on Advanced Information Systems Engineering (pp. 231-242)","author":"Toloudis D.","year":"2016","unstructured":"Toloudis , D. , Spanos , G. , & Angelis , L. ( 2016 , June). Associating the severity of vulnerabilities with their description . In International Conference on Advanced Information Systems Engineering (pp. 231-242) . Springer, Cham. Toloudis, D., Spanos, G., & Angelis, L. (2016, June). Associating the severity of vulnerabilities with their description. In International Conference on Advanced Information Systems Engineering (pp. 231-242). Springer, Cham."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.09.039"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1361684.1361686"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2999792.2999959"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3044805.3045025"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_1_13_1","volume-title":"Bag of tricks for efficient text classification. arXiv preprint arXiv:1607.01759","author":"Joulin A.","year":"2016","unstructured":"Joulin , A. , Grave , E. , Bojanowski , P. , & Mikolov , T. ( 2016 ). Bag of tricks for efficient text classification. arXiv preprint arXiv:1607.01759 . Joulin, A., Grave, E., Bojanowski, P., & Mikolov, T. (2016). Bag of tricks for efficient text classification. arXiv preprint arXiv:1607.01759."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.007"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2019.106839"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_3_2_1_17_1","first-page":"49","volume-title":"International journal of bio-science and bio-technology, 4(1)","author":"Kerdprasop N.","year":"2012","unstructured":"Kerdprasop , N. , & Kerdprasop , K. ( 2012 ). On the generation of accurate predictive model from highly imbalanced data with heuristics and replication techniques . International journal of bio-science and bio-technology, 4(1) , 49 - 64 . Kerdprasop, N., & Kerdprasop, K. (2012). On the generation of accurate predictive model from highly imbalanced data with heuristics and replication techniques. International journal of bio-science and bio-technology, 4(1), 49-64."},{"key":"e_1_3_2_1_18_1","volume-title":"Open Source Business Resource, (June","author":"Kouns J.","year":"2008","unstructured":"Kouns , J. ( 2008 ). Open Source Vulnerability Database Project . Open Source Business Resource, (June 2008). Kouns, J. (2008). Open Source Vulnerability Database Project. Open Source Business Resource, (June 2008)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491845.2491871"},{"key":"e_1_3_2_1_20_1","volume-title":"Bei Yu","author":"Ikonomakis M.","year":"2005","unstructured":"Ikonomakis , M. , Kotsiantis , S. , & Tampakas , V. ( 2005 ). Text classification using machine learning techniques. WSEAS transactions on computers, 4(8), 966-974. [24] An Evaluation of Text Classifification Methods for Literary Study , Bei Yu , Syracuse University Ikonomakis, M., Kotsiantis, S., & Tampakas, V. (2005). Text classification using machine learning techniques. WSEAS transactions on computers, 4(8), 966-974. [24] An Evaluation of Text Classifification Methods for Literary Study, Bei Yu, Syracuse University"},{"key":"e_1_3_2_1_21_1","first-page":"1322","volume-title":"ADASYN: Adaptive synthetic sampling approach for imbalanced learning. In 2008 IEEE international joint conference on neural networks","author":"He H.","unstructured":"He , H. , Bai , Y. , Garcia , E. A. , & Li , S. (2008, June ). ADASYN: Adaptive synthetic sampling approach for imbalanced learning. In 2008 IEEE international joint conference on neural networks (IEEE world congress on computational intelligence) (pp. 1322 - 1328 ). IEEE. He, H., Bai, Y., Garcia, E. A., & Li, S. (2008, June). ADASYN: Adaptive synthetic sampling approach for imbalanced learning. In 2008 IEEE international joint conference on neural networks (IEEE world congress on computational intelligence) (pp. 1322-1328). IEEE."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1051675"}],"event":{"name":"PCI 2021: 25th Pan-Hellenic Conference on Informatics","location":"Volos Greece","acronym":"PCI 2021"},"container-title":["25th Pan-Hellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503823.3503888","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503823.3503888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:31Z","timestamp":1750188631000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503823.3503888"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,26]]},"references-count":22,"alternative-id":["10.1145\/3503823.3503888","10.1145\/3503823"],"URL":"https:\/\/doi.org\/10.1145\/3503823.3503888","relation":{},"subject":[],"published":{"date-parts":[[2021,11,26]]},"assertion":[{"value":"2022-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}