{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T10:10:26Z","timestamp":1768817426707,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T00:00:00Z","timestamp":1686700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,14]]},"DOI":"10.1145\/3590777.3590784","type":"proceedings-article","created":{"date-parts":[[2023,5,27]],"date-time":"2023-05-27T10:11:40Z","timestamp":1685182300000},"page":"42-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Useful Cyber Threat Intelligence Relation Retrieval Using Transfer Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4361-0461","authenticated-orcid":false,"given":"Chia-Mei","family":"Chen","sequence":"first","affiliation":[{"name":"National Sun Yat-Sen University, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4992-8786","authenticated-orcid":false,"given":"Fang-Hsuan","family":"Hsu","sequence":"additional","affiliation":[{"name":"National Sun Yat-Sen University, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8877-2421","authenticated-orcid":false,"given":"Jenq-Neng","family":"Hwang","sequence":"additional","affiliation":[{"name":"University of Washington, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Jul. 4","author":"Team Embroker","year":"2022","unstructured":"Embroker Team . \"2022 Must-Know Cyber Attack Statistics and Trends.\" https:\/\/www.embroker.com\/blog\/cyber-attack-statistics\/ (accessed : Jul. 4 , 2022 ). Embroker Team. \"2022 Must-Know Cyber Attack Statistics and Trends.\" https:\/\/www.embroker.com\/blog\/cyber-attack-statistics\/ (accessed: Jul. 4, 2022)."},{"key":"e_1_3_2_1_2_1","volume-title":"UN warns cybercrime on rise during pandemic.\" https:\/\/abcnews.go.com\/Health\/wireStory\/latest-india-reports-largest-single-day-virus-spike-70826542 (accessed: Jul. 5","author":"Press The Associated","year":"2022","unstructured":"The Associated Press . \" The Latest : UN warns cybercrime on rise during pandemic.\" https:\/\/abcnews.go.com\/Health\/wireStory\/latest-india-reports-largest-single-day-virus-spike-70826542 (accessed: Jul. 5 ,, 2022 ). The Associated Press. \"The Latest: UN warns cybercrime on rise during pandemic.\" https:\/\/abcnews.go.com\/Health\/wireStory\/latest-india-reports-largest-single-day-virus-spike-70826542 (accessed: Jul. 5,, 2022)."},{"key":"e_1_3_2_1_3_1","unstructured":"Microsoft. \"Cybersecurity threats to cost organizations in Asia Pacific US$1.75 trillion in economic losses.\" https:\/\/news.microsoft.com\/apac\/2018\/05\/18\/cybersecurity-threats-to-cost-organizations-in-asia-pacific-us1-75-trillion-in-economic-losses\/ (accessed June 20 2018.  Microsoft. \"Cybersecurity threats to cost organizations in Asia Pacific US$1.75 trillion in economic losses.\" https:\/\/news.microsoft.com\/apac\/2018\/05\/18\/cybersecurity-threats-to-cost-organizations-in-asia-pacific-us1-75-trillion-in-economic-losses\/ (accessed June 20 2018."},{"key":"e_1_3_2_1_4_1","volume-title":"Jul. 5","author":"O'Driscoll A.","year":"2022","unstructured":"A. O'Driscoll . \"25+ cyber security vulnerability statistics and facts of 2022.\" https:\/\/www.comparitech.com\/blog\/information-security\/cybersecurity-vulnerability-statistics\/ (accessed : Jul. 5 , 2022 ). A. O'Driscoll. \"25+ cyber security vulnerability statistics and facts of 2022.\" https:\/\/www.comparitech.com\/blog\/information-security\/cybersecurity-vulnerability-statistics\/ (accessed: Jul. 5, 2022)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-150","volume-title":"Guide to cyber threat information sharing,\" National Institute of Standards and Technology","author":"Johnson C.","year":"2016","unstructured":"C. Johnson , M. Badger , D. Waltermire , J. Snyder , and C. Skorupka , \" Guide to cyber threat information sharing,\" National Institute of Standards and Technology , 2016 . C. Johnson, M. Badger, D. Waltermire, J. Snyder, and C. Skorupka, \"Guide to cyber threat information sharing,\" National Institute of Standards and Technology, 2016."},{"key":"e_1_3_2_1_6_1","unstructured":"R. Brown and R. M. Lee \"2021 SANS Cyber Threat Intelligence (CTI) Survey.\" [Online]. Available: https:\/\/www.cybersixgill.com\/wp-content\/uploads\/2021\/02\/SANS_CTI_Survey_2021_Sixgill.pdf  R. Brown and R. M. Lee \"2021 SANS Cyber Threat Intelligence (CTI) Survey.\" [Online]. Available: https:\/\/www.cybersixgill.com\/wp-content\/uploads\/2021\/02\/SANS_CTI_Survey_2021_Sixgill.pdf"},{"key":"e_1_3_2_1_7_1","volume-title":"Dec. 01","author":"Threat Intelligence","year":"2022","unstructured":"Cyberwatching. \" Threat Intelligence \" https:\/\/www.cyberwatching.eu\/cybersecurity-and-privacy-project-clusters\/threat-intelligence (accessed : Dec. 01 ,, 2022 ). Cyberwatching. \"Threat Intelligence \" https:\/\/www.cyberwatching.eu\/cybersecurity-and-privacy-project-clusters\/threat-intelligence (accessed: Dec. 01,, 2022)."},{"key":"e_1_3_2_1_8_1","unstructured":"Wei-Chih Chao \"Leverage Text Analysis in discovering Cyber Threat Intelligence from Hacker Forums \" 2019.  Wei-Chih Chao \"Leverage Text Analysis in discovering Cyber Threat Intelligence from Hacker Forums \" 2019."},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"Using entropy and mutual information to extract threat actions from cyber threat intelligence,\" in 2018 IEEE International Conference on Intelligence and Security Informatics (ISI)","author":"Husari G.","year":"2018","unstructured":"G. Husari , X. Niu , B. Chu , and E. Al-Shaer , \" Using entropy and mutual information to extract threat actions from cyber threat intelligence,\" in 2018 IEEE International Conference on Intelligence and Security Informatics (ISI) , 2018 : IEEE , pp. 1 - 6 . G. Husari, X. Niu, B. Chu, and E. Al-Shaer, \"Using entropy and mutual information to extract threat actions from cyber threat intelligence,\" in 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), 2018: IEEE, pp. 1-6."},{"key":"e_1_3_2_1_10_1","volume-title":"Aug. 1","author":"MITRE","year":"2020","unstructured":"\" MITRE ATT&CK.\" https:\/\/attack.mitre.org\/ (accessed : Aug. 1 , 2020 ). \"MITRE ATT&CK.\" https:\/\/attack.mitre.org\/ (accessed: Aug. 1, 2020)."},{"key":"e_1_3_2_1_11_1","first-page":"755","volume-title":"Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence,\" in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","author":"Liao X.","year":"2016","unstructured":"X. Liao , K. Yuan , X. Wang , Z. Li , L. Xing , and R. Beyah , \" Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence,\" in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security , 2016 , pp. 755 - 766 . X. Liao, K. Yuan, X. Wang, Z. Li, L. Xing, and R. Beyah, \"Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence,\" in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 755-766."},{"key":"e_1_3_2_1_12_1","first-page":"687","volume-title":"automated IOC generation for accurate and interpretable endpoint malware detection,\" in Proceedings of the 35th Annual Computer Security Applications Conference","author":"Y. Kurogome","year":"2019","unstructured":"Y. Kurogome , \"EIGER : automated IOC generation for accurate and interpretable endpoint malware detection,\" in Proceedings of the 35th Annual Computer Security Applications Conference , 2019 , pp. 687 - 701 . Y. Kurogome , \"EIGER: automated IOC generation for accurate and interpretable endpoint malware detection,\" in Proceedings of the 35th Annual Computer Security Applications Conference, 2019, pp. 687-701."},{"key":"e_1_3_2_1_13_1","first-page":"193","volume-title":"IEEE","author":"P. Gao","unstructured":"P. Gao , \" Enabling efficient cyber threat hunting with cyber threat intelligence,\" in 2021 IEEE 37th International Conference on Data Engineering (ICDE), 2021 : IEEE , pp. 193 - 204 . P. Gao , \"Enabling efficient cyber threat hunting with cyber threat intelligence,\" in 2021 IEEE 37th International Conference on Data Engineering (ICDE), 2021: IEEE, pp. 193-204."},{"key":"e_1_3_2_1_14_1","first-page":"79","volume-title":"Developing understanding of hacker language through the use of lexical semantics,\" in 2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","author":"Benjamin V.","year":"2015","unstructured":"V. Benjamin and H. Chen , \" Developing understanding of hacker language through the use of lexical semantics,\" in 2015 IEEE International Conference on Intelligence and Security Informatics (ISI) , 2015 : IEEE , pp. 79 - 84 . V. Benjamin and H. Chen, \"Developing understanding of hacker language through the use of lexical semantics,\" in 2015 IEEE International Conference on Intelligence and Security Informatics (ISI), 2015: IEEE, pp. 79-84."},{"key":"e_1_3_2_1_15_1","first-page":"279","volume-title":"Hacker Forum Exploit and Classification for Proactive Cyber Threat Intelligence,\" in International Conference on Inventive Computation Technologies","author":"Gautam A. S.","year":"2019","unstructured":"A. S. Gautam , Y. Gahlot , and P. Kamat , \" Hacker Forum Exploit and Classification for Proactive Cyber Threat Intelligence,\" in International Conference on Inventive Computation Technologies , 2019 : Springer , pp. 279 - 285 . A. S. Gautam, Y. Gahlot, and P. Kamat, \"Hacker Forum Exploit and Classification for Proactive Cyber Threat Intelligence,\" in International Conference on Inventive Computation Technologies, 2019: Springer, pp. 279-285."},{"key":"e_1_3_2_1_16_1","first-page":"31","volume-title":"Exploring hacker assets in underground forums,\" in 2015 IEEE international conference on intelligence and security informatics (ISI)","author":"Samtani S.","year":"2015","unstructured":"S. Samtani , R. Chinn , and H. Chen , \" Exploring hacker assets in underground forums,\" in 2015 IEEE international conference on intelligence and security informatics (ISI) , 2015 : IEEE , pp. 31 - 36 . S. Samtani, R. Chinn, and H. Chen, \"Exploring hacker assets in underground forums,\" in 2015 IEEE international conference on intelligence and security informatics (ISI), 2015: IEEE, pp. 31-36."},{"key":"e_1_3_2_1_17_1","first-page":"3648","volume-title":"Extracting cyber threat intelligence from hacker forums: Support vector machines versus convolutional neural networks,\" in 2017 IEEE International Conference on Big Data (Big Data)","author":"Deliu I.","year":"2017","unstructured":"I. Deliu , C. Leichter , and K. Franke , \" Extracting cyber threat intelligence from hacker forums: Support vector machines versus convolutional neural networks,\" in 2017 IEEE International Conference on Big Data (Big Data) , 2017 : IEEE , pp. 3648 - 3656 . I. Deliu, C. Leichter, and K. Franke, \"Extracting cyber threat intelligence from hacker forums: Support vector machines versus convolutional neural networks,\" in 2017 IEEE International Conference on Big Data (Big Data), 2017: IEEE, pp. 3648-3656."},{"key":"e_1_3_2_1_18_1","first-page":"1","volume-title":"Cyberthreat detection from twitter using deep neural networks,\" in 2019 International Joint Conference on Neural Networks (IJCNN)","author":"Dion\u00edsio N.","year":"2019","unstructured":"N. Dion\u00edsio , F. Alves , P. M. Ferreira , and A. Bessani , \" Cyberthreat detection from twitter using deep neural networks,\" in 2019 International Joint Conference on Neural Networks (IJCNN) , 2019 : IEEE , pp. 1 - 8 . N. Dion\u00edsio, F. Alves, P. M. Ferreira, and A. Bessani, \"Cyberthreat detection from twitter using deep neural networks,\" in 2019 International Joint Conference on Neural Networks (IJCNN), 2019: IEEE, pp. 1-8."},{"key":"e_1_3_2_1_19_1","volume-title":"TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources,\" presented at the Proceedings of the 33rd Annual Computer Security Applications Conference","author":"Husari G.","year":"2017","unstructured":"G. Husari , E. Al-Shaer , M. Ahmed , B. Chu , and X. Niu , \" TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources,\" presented at the Proceedings of the 33rd Annual Computer Security Applications Conference , 2017 . G. Husari, E. Al-Shaer, M. Ahmed, B. Chu, and X. Niu, \"TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources,\" presented at the Proceedings of the 33rd Annual Computer Security Applications Conference, 2017."},{"key":"e_1_3_2_1_20_1","volume-title":"Threat Action Extraction using Information Retrieval,\" in CS & IT Conference Proceedings","author":"Chen C.-M.","year":"2021","unstructured":"C.-M. Chen , J.-Y. Kan , Y.-H. Ou , Z.-X. Cai , and A. Guan , \" Threat Action Extraction using Information Retrieval,\" in CS & IT Conference Proceedings , 2021 , vol. 11 , no. 7: CS & IT Conference Proceedings. C.-M. Chen, J.-Y. Kan, Y.-H. Ou, Z.-X. Cai, and A. Guan, \"Threat Action Extraction using Information Retrieval,\" in CS & IT Conference Proceedings, 2021, vol. 11, no. 7: CS & IT Conference Proceedings."},{"key":"e_1_3_2_1_21_1","first-page":"2018","article-title":"LSTM recurrent neural networks for cybersecurity named entity recognition","volume":"11","author":"Gasmi H.","year":"2018","unstructured":"H. Gasmi , A. Bouras , and J. Laval , \" LSTM recurrent neural networks for cybersecurity named entity recognition ,\" ICSEA , vol. 11 , p. 2018 , 2018 . H. Gasmi, A. Bouras, and J. Laval, \"LSTM recurrent neural networks for cybersecurity named entity recognition,\" ICSEA, vol. 11, p. 2018, 2018.","journal-title":"ICSEA"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2984582"},{"key":"e_1_3_2_1_23_1","unstructured":"NVD. \"NVD Data Feeds.\" https:\/\/nvd.nist.gov\/vuln\/data-feeds (accessed 06\/07 2021).  NVD. \"NVD Data Feeds.\" https:\/\/nvd.nist.gov\/vuln\/data-feeds (accessed 06\/07 2021)."},{"key":"e_1_3_2_1_24_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding,\" arXiv preprint arXiv:1810.04805","author":"Devlin J.","year":"2018","unstructured":"J. Devlin , M.-W. Chang , K. Lee , and K. Toutanova , \" Bert: Pre-training of deep bidirectional transformers for language understanding,\" arXiv preprint arXiv:1810.04805 , 2018 . J. Devlin, M.-W. Chang, K. Lee, and K. Toutanova, \"Bert: Pre-training of deep bidirectional transformers for language understanding,\" arXiv preprint arXiv:1810.04805, 2018."},{"key":"e_1_3_2_1_25_1","first-page":"9875199","article-title":"CTI View: APT Threat Intelligence Analysis System","volume":"2022","author":"Zhou Y.","year":"2022","unstructured":"Y. Zhou , Y. Tang , M. Yi , C. Xi , and H. Lu , \" CTI View: APT Threat Intelligence Analysis System ,\" Security and Communication Networks , vol. 2022 , p. 9875199 , 2022 \/01\/03 2022, doi: 10.1155\/2022\/9875199. 10.1155\/2022 Y. Zhou, Y. Tang, M. Yi, C. Xi, and H. Lu, \"CTI View: APT Threat Intelligence Analysis System,\" Security and Communication Networks, vol. 2022, p. 9875199, 2022\/01\/03 2022, doi: 10.1155\/2022\/9875199.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1109\/CSCWD49262.2021.9437858","volume-title":"2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","author":"X. Wang","year":"2021","unstructured":"X. Wang , \" A Method for Extracting Unstructured Threat Intelligence Based on Dictionary Template and Reinforcement Learning ,\" in 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD) , 5-7 May 2021 2021, pp. 262 - 267 , doi: 10.1109\/CSCWD49262.2021.9437858. 10.1109\/CSCWD49262.2021.9437858 X. Wang , \"A Method for Extracting Unstructured Threat Intelligence Based on Dictionary Template and Reinforcement Learning,\" in 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 5-7 May 2021 2021, pp. 262-267, doi: 10.1109\/CSCWD49262.2021.9437858."},{"key":"e_1_3_2_1_27_1","volume-title":"Named Entity Recognition from Synthesis Procedural Text in Materials Science Domain with Attention-Based Approach","author":"Yang H.","year":"2021","unstructured":"H. Yang and W. Hsu , Named Entity Recognition from Synthesis Procedural Text in Materials Science Domain with Attention-Based Approach . 2021 . H. Yang and W. Hsu, Named Entity Recognition from Synthesis Procedural Text in Materials Science Domain with Attention-Based Approach. 2021."},{"key":"#cr-split#-e_1_3_2_1_28_1.1","doi-asserted-by":"crossref","unstructured":"A. Fang \"Extracting clinical named entity for pituitary adenomas from Chinese electronic medical records \" BMC Medical Informatics and Decision Making vol. 22 03\/23 2022 doi: 10.1186\/s12911-022-01810-z. 10.1186\/s12911-022-01810-z","DOI":"10.1186\/s12911-022-01810-z"},{"key":"#cr-split#-e_1_3_2_1_28_1.2","doi-asserted-by":"crossref","unstructured":"A. Fang \"Extracting clinical named entity for pituitary adenomas from Chinese electronic medical records \" BMC Medical Informatics and Decision Making vol. 22 03\/23 2022 doi: 10.1186\/s12911-022-01810-z.","DOI":"10.1186\/s12911-022-01810-z"},{"key":"#cr-split#-e_1_3_2_1_29_1.1","doi-asserted-by":"crossref","unstructured":"X. Wang \"DNRTI: A Large-Scale Dataset for Named Entity Recognition in Threat Intelligence \" in 2020 IEEE 19th International Conference on Trust Security and Privacy in Computing and Communications (TrustCom) 29 Dec.-1 Jan. 2021 2020 pp. 1842-1848 doi: 10.1109\/TrustCom50675.2020.00252. 10.1109\/TrustCom50675.2020.00252","DOI":"10.1109\/TrustCom50675.2020.00252"},{"key":"#cr-split#-e_1_3_2_1_29_1.2","doi-asserted-by":"crossref","unstructured":"X. Wang \"DNRTI: A Large-Scale Dataset for Named Entity Recognition in Threat Intelligence \" in 2020 IEEE 19th International Conference on Trust Security and Privacy in Computing and Communications (TrustCom) 29 Dec.-1 Jan. 2021 2020 pp. 1842-1848 doi: 10.1109\/TrustCom50675.2020.00252.","DOI":"10.1109\/TrustCom50675.2020.00252"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1109\/CSR51186.2021.9527981","volume-title":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","author":"P. Evangelatos","year":"2021","unstructured":"P. Evangelatos , \" Named Entity Recognition in Cyber Threat Intelligence Using Transformer-based Models,\" in 2021 IEEE International Conference on Cyber Security and Resilience (CSR) , 26-28 July 2021 2021, pp. 348 - 353 , doi: 10.1109\/CSR51186.2021.9527981. 10.1109\/CSR51186.2021.9527981 P. Evangelatos , \"Named Entity Recognition in Cyber Threat Intelligence Using Transformer-based Models,\" in 2021 IEEE International Conference on Cyber Security and Resilience (CSR), 26-28 July 2021 2021, pp. 348-353, doi: 10.1109\/CSR51186.2021.9527981."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3002863"},{"key":"e_1_3_2_1_32_1","first-page":"7729456","article-title":"A Threat Intelligence Analysis Method Based on Feature Weighting and BERT-BiGRU for Industrial Internet of Things","volume":"2022","author":"Yan J.","year":"2022","unstructured":"J. Yan , Z. Du , J. Li , S. Yang , J. Li , and J. Li , \" A Threat Intelligence Analysis Method Based on Feature Weighting and BERT-BiGRU for Industrial Internet of Things ,\" Security and Communication Networks , vol. 2022 , p. 7729456 , 2022 \/02\/25 2022, doi: 10.1155\/2022\/7729456. 10.1155\/2022 J. Yan, Z. Du, J. Li, S. Yang, J. Li, and J. Li, \"A Threat Intelligence Analysis Method Based on Feature Weighting and BERT-BiGRU for Industrial Internet of Things,\" Security and Communication Networks, vol. 2022, p. 7729456, 2022\/02\/25 2022, doi: 10.1155\/2022\/7729456.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_1_33_1","first-page":"2361","volume-title":"Enriching pre-trained language model with entity information for relation classification,\" in Proceedings of the 28th ACM international conference on information and knowledge management","author":"Wu S.","year":"2019","unstructured":"S. Wu and Y. He , \" Enriching pre-trained language model with entity information for relation classification,\" in Proceedings of the 28th ACM international conference on information and knowledge management , 2019 , pp. 2361 - 2364 . S. Wu and Y. He, \"Enriching pre-trained language model with entity information for relation classification,\" in Proceedings of the 28th ACM international conference on information and knowledge management, 2019, pp. 2361-2364."},{"key":"e_1_3_2_1_34_1","volume-title":"Nov. 11","year":"2020","unstructured":"kbandla. \"Aptnotes.\" https:\/\/github.com\/aptnotes\/data (accessed : Nov. 11 , 2020 ). kbandla. \"Aptnotes.\" https:\/\/github.com\/aptnotes\/data (accessed: Nov. 11, 2020)."},{"key":"e_1_3_2_1_35_1","volume-title":"May. 3","year":"2020","unstructured":"\"pdfminer.\" https:\/\/pypi.org\/project\/pdfminer\/ (accessed : May. 3 , 2020 ). \"pdfminer.\" https:\/\/pypi.org\/project\/pdfminer\/ (accessed: May. 3, 2020)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"M. Aiken \"An updated evaluation of Google Translate accuracy \" Studies in linguistics and literature vol. 3 no. 3 pp. 253-260 2019.  M. Aiken \"An updated evaluation of Google Translate accuracy \" Studies in linguistics and literature vol. 3 no. 3 pp. 253-260 2019.","DOI":"10.22158\/sll.v3n3p253"},{"key":"e_1_3_2_1_37_1","volume-title":"Sep. 18","author":"C. T. I. T. Committee","year":"2021","unstructured":"C. T. I. T. Committee . \" Structured Threat Information Expression (STIX).\" https:\/\/oasis-open.github.io\/cti-documentation\/ (accessed : Sep. 18 , 2021 ). C. T. I. T. Committee. \"Structured Threat Information Expression (STIX).\" https:\/\/oasis-open.github.io\/cti-documentation\/ (accessed: Sep. 18, 2021)."},{"key":"e_1_3_2_1_38_1","volume-title":"Dec. 01","author":"h3x.eu. \"Malware Corp","year":"2022","unstructured":"h3x.eu. \"Malware Corp us Tracker.\" https:\/\/tracker.h3x.eu\/families (accessed : Dec. 01 , , 2022 ). h3x.eu. \"Malware Corpus Tracker.\" https:\/\/tracker.h3x.eu\/families (accessed: Dec. 01, , 2022)."},{"key":"e_1_3_2_1_39_1","first-page":"102","volume-title":"i. Tsujii, \"BRAT: a web-based tool for NLP-assisted text annotation,\" in Proceedings of the Demonstrations at the 13th Conference of the European","author":"Stenetorp P.","year":"2012","unstructured":"P. Stenetorp , S. Pyysalo , G. Topi\u0107 , T. Ohta , S. Ananiadou , and J. i. Tsujii, \"BRAT: a web-based tool for NLP-assisted text annotation,\" in Proceedings of the Demonstrations at the 13th Conference of the European Chapter of the Association for Computational Linguistics, 2012 , pp. 102 - 107 . P. Stenetorp, S. Pyysalo, G. Topi\u0107, T. Ohta, S. Ananiadou, and J. i. Tsujii, \"BRAT: a web-based tool for NLP-assisted text annotation,\" in Proceedings of the Demonstrations at the 13th Conference of the European Chapter of the Association for Computational Linguistics, 2012, pp. 102-107."},{"key":"e_1_3_2_1_40_1","volume-title":"Pre-training of Deep Bidirectional Transformers for Language Understanding.\" https:\/\/nlp.stanford.edu\/seminar\/details\/jdevlin.pdf (accessed","author":"Devlin J.","year":"2022","unstructured":"J. Devlin . \"BERT : Pre-training of Deep Bidirectional Transformers for Language Understanding.\" https:\/\/nlp.stanford.edu\/seminar\/details\/jdevlin.pdf (accessed : Dec. 01, 2022 ). J. Devlin. \"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding.\" https:\/\/nlp.stanford.edu\/seminar\/details\/jdevlin.pdf (accessed: Dec. 01, 2022)."}],"event":{"name":"EICC 2023: European Interdisciplinary Cybersecurity Conference","location":"Stavanger Norway","acronym":"EICC 2023"},"container-title":["European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590777.3590784","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:26Z","timestamp":1750178186000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590777.3590784"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,14]]},"references-count":42,"alternative-id":["10.1145\/3590777.3590784","10.1145\/3590777"],"URL":"https:\/\/doi.org\/10.1145\/3590777.3590784","relation":{},"subject":[],"published":{"date-parts":[[2023,6,14]]},"assertion":[{"value":"2023-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}