{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T22:33:01Z","timestamp":1770330781774,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T00:00:00Z","timestamp":1716508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,24]]},"DOI":"10.1145\/3674029.3674067","type":"proceedings-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:25:22Z","timestamp":1726057522000},"page":"239-244","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Learning the Structure of Commands by Retraining a Language Model"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0717-8181","authenticated-orcid":false,"given":"Zafar","family":"Hussain","sequence":"first","affiliation":[{"name":"Computer Science, University of Helsinki, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0953-9825","authenticated-orcid":false,"given":"Lalli","family":"Myllyaho","sequence":"additional","affiliation":[{"name":"Computer Science, University of Helsinki, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5083-1927","authenticated-orcid":false,"given":"Jukka K.","family":"Nurminen","sequence":"additional","affiliation":[{"name":"Computer Science, University of Helsinki, Finland"}]}],"member":"320","published-online":{"date-parts":[[2024,9,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the The 20th Annual Workshop of the Australasian Language Technology Association. Australasian Language Technology Association","author":"Almodovar Crispin","year":"2022","unstructured":"Crispin Almodovar, Fariza Sabrina, Sarvnaz Karimi, and Salahuddin Azad. 2022. Can Language Models Help in System Security? Investigating Log Anomaly Detection using BERT. In Proceedings of the The 20th Annual Workshop of the Australasian Language Technology Association. Australasian Language Technology Association, Adelaide, Australia, 139\u2013147."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0152-x"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Ariel Bar Bracha Shapira Lior Rokach and Moshe Unger. 2016. Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis. In 2016 IEEE International Conference on Software Science Technology and Engineering (SWSTE). 28\u201336. https:\/\/doi.org\/10.1109\/SWSTE.2016.13","DOI":"10.1109\/SWSTE.2016.13"},{"key":"e_1_3_2_1_4_1","unstructured":"Markus Bayer Philipp Kuehn Ramin Shanehsaz and Christian Reuter. 2022. CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain. arxiv:2212.02974\u00a0[cs.CR]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/03610927408827101"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1979.4766909"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1423"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2306.14263"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534113"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3257518"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589883.3589892"},{"key":"e_1_3_2_1_13_1","unstructured":"T. kojm. -. Clam Anti-virus Signature Database. http:\/\/www.clamav.net"},{"key":"e_1_3_2_1_14_1","unstructured":"Strait\u00a0M Levandoski\u00a0J. Sommer\u00a0E.-. Application Layer Packet Classifier for Linux.http:\/\/l7-filter.sourceforge.net"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-021-00455-y"},{"key":"e_1_3_2_1_16_1","volume-title":"Snort: Lightweight Intrusion Detection for Networks. In LiSA. https:\/\/api.semanticscholar.org\/CorpusID:6673399","author":"Roesch Martin","year":"1999","unstructured":"Martin Roesch. 1999. Snort: Lightweight Intrusion Detection for Networks. In LiSA. https:\/\/api.semanticscholar.org\/CorpusID:6673399"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0377-0427(87)90125-7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2004.05.026"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2017.8393092"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2004.823851"},{"key":"e_1_3_2_1_21_1","volume-title":"BERTScore: Evaluating Text Generation with BERT. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=SkeHuCVFDr","author":"Tianyi","year":"2020","unstructured":"Tianyi Zhang*, Varsha Kishore*, Felix Wu*, Kilian\u00a0Q. Weinberger, and Yoav Artzi. 2020. BERTScore: Evaluating Text Generation with BERT. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=SkeHuCVFDr"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2415763"}],"event":{"name":"ICMLT 2024: 2024 9th International Conference on Machine Learning Technologies","location":"Oslo Norway","acronym":"ICMLT 2024"},"container-title":["2024 9th International Conference on Machine Learning Technologies (ICMLT)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674029.3674067","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3674029.3674067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:04:18Z","timestamp":1756487058000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674029.3674067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,24]]},"references-count":22,"alternative-id":["10.1145\/3674029.3674067","10.1145\/3674029"],"URL":"https:\/\/doi.org\/10.1145\/3674029.3674067","relation":{},"subject":[],"published":{"date-parts":[[2024,5,24]]},"assertion":[{"value":"2024-09-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}