{"id":"https://openalex.org/W4400410567","doi":"https://doi.org/10.1007/s10207-024-00882-4","title":"Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system","display_name":"Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system","publication_year":2024,"publication_date":"2024-07-08","ids":{"openalex":"https://openalex.org/W4400410567","doi":"https://doi.org/10.1007/s10207-024-00882-4"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-024-00882-4","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1007/s10207-024-00882-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00882-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00882-4.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007124400","display_name":"S\u00fcleyman Muhammed Ar\u0131kan","orcid":"https://orcid.org/0000-0003-1526-2970"},"institutions":[{"id":"https://openalex.org/I95634034","display_name":"Gazi University","ror":"https://ror.org/054xkpr46","country_code":"TR","type":"education","lineage":["https://openalex.org/I95634034"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"S\u00fcleyman Muhammed Ar\u0131kan","raw_affiliation_strings":["Computer Forensics, Institute of Informatics, Gazi University, 06680, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"Computer Forensics, Institute of Informatics, Gazi University, 06680, Ankara, Turkey","institution_ids":["https://openalex.org/I95634034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056468351","display_name":"Aynur Ko\u00e7ak","orcid":"https://orcid.org/0000-0001-9647-7281"},"institutions":[{"id":"https://openalex.org/I95634034","display_name":"Gazi University","ror":"https://ror.org/054xkpr46","country_code":"TR","type":"education","lineage":["https://openalex.org/I95634034"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Aynur Ko\u00e7ak","raw_affiliation_strings":["Electrical and Electronics Engineering, Faculty of Technology, Gazi University, 06500, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"Electrical and Electronics Engineering, Faculty of Technology, Gazi University, 06500, Ankara, Turkey","institution_ids":["https://openalex.org/I95634034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015727259","display_name":"Mustafa Alkan","orcid":"https://orcid.org/0000-0002-9542-8039"},"institutions":[{"id":"https://openalex.org/I95634034","display_name":"Gazi University","ror":"https://ror.org/054xkpr46","country_code":"TR","type":"education","lineage":["https://openalex.org/I95634034"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Mustafa Alkan","raw_affiliation_strings":["Computer Forensics, Institute of Informatics, Gazi University, 06680, Ankara, Turkey","Electrical and Electronics Engineering, Faculty of Technology, Gazi University, 06500, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"Computer Forensics, Institute of Informatics, Gazi University, 06680, Ankara, Turkey","institution_ids":["https://openalex.org/I95634034"]},{"raw_affiliation_string":"Electrical and Electronics Engineering, Faculty of Technology, Gazi University, 06500, Ankara, Turkey","institution_ids":["https://openalex.org/I95634034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007124400"],"corresponding_institution_ids":["https://openalex.org/I95634034"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":1.0861,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.75907434,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"23","issue":"5","first_page":"3135","last_page":"3151"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8100439310073853},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5654252767562866},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5458143949508667},{"id":"https://openalex.org/keywords/production","display_name":"Production (economics)","score":0.511644184589386},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.48414474725723267},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.4119785726070404},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.377395898103714},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3313741087913513},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.32533133029937744},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.24468612670898438},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.23096296191215515},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.18791687488555908},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.12362843751907349}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8100439310073853},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5654252767562866},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5458143949508667},{"id":"https://openalex.org/C2778348673","wikidata":"https://www.wikidata.org/wiki/Q739302","display_name":"Production (economics)","level":2,"score":0.511644184589386},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.48414474725723267},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.4119785726070404},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.377395898103714},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3313741087913513},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32533133029937744},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.24468612670898438},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23096296191215515},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.18791687488555908},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.12362843751907349},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-024-00882-4","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1007/s10207-024-00882-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00882-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-024-00882-4","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1007/s10207-024-00882-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00882-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321861","display_name":"Gazi \u00dcniversitesi","ror":"https://ror.org/054xkpr46"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4400410567.pdf","grobid_xml":"https://content.openalex.org/works/W4400410567.grobid-xml"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W17195072","https://openalex.org/W49922133","https://openalex.org/W1108280307","https://openalex.org/W1614668525","https://openalex.org/W1893133781","https://openalex.org/W1997646511","https://openalex.org/W2014316112","https://openalex.org/W2119251836","https://openalex.org/W2132929535","https://openalex.org/W2297419069","https://openalex.org/W2514974017","https://openalex.org/W2515236103","https://openalex.org/W2532962075","https://openalex.org/W2539046442","https://openalex.org/W2577142429","https://openalex.org/W2748690817","https://openalex.org/W2760313715","https://openalex.org/W2770227012","https://openalex.org/W2781491433","https://openalex.org/W2888698761","https://openalex.org/W2921186948","https://openalex.org/W2947471631","https://openalex.org/W2964522977","https://openalex.org/W2988065079","https://openalex.org/W3005105185","https://openalex.org/W3007993592","https://openalex.org/W3016326598","https://openalex.org/W3021569284","https://openalex.org/W3024317787","https://openalex.org/W3036588308","https://openalex.org/W3040254036","https://openalex.org/W3046848477","https://openalex.org/W3087102429","https://openalex.org/W3097867666","https://openalex.org/W3101228802","https://openalex.org/W3168151787","https://openalex.org/W4224285184","https://openalex.org/W4237977046","https://openalex.org/W4239922723","https://openalex.org/W4285285071","https://openalex.org/W4289754877","https://openalex.org/W4308154132","https://openalex.org/W4309892485","https://openalex.org/W4360764539","https://openalex.org/W4360764843","https://openalex.org/W4377103668","https://openalex.org/W4377693474","https://openalex.org/W4379983205","https://openalex.org/W4381884138","https://openalex.org/W4389088863"],"related_works":["https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4389157351","https://openalex.org/W4232561318","https://openalex.org/W4253977752","https://openalex.org/W3120595989","https://openalex.org/W2964829536","https://openalex.org/W2904586340","https://openalex.org/W4380791770","https://openalex.org/W3173591235"],"abstract_inverted_index":{"Abstract":[0],"Software":[1],"can":[2],"be":[3],"vulnerable":[4],"to":[5,34],"various":[6],"types":[7],"of":[8,12,30,38,141,146,176],"interference.":[9],"The":[10,28,81,105,130,157],"production":[11],"cyber":[13,40,162],"threat":[14,41,163],"intelligence":[15,164,170],"for":[16,65],"closed":[17,45,166],"source":[18,46,167],"software":[19,47],"requires":[20],"significant":[21],"effort,":[22],"experience,":[23],"and":[24,71,85,96,100,113],"many":[25],"manual":[26],"steps.":[27],"objective":[29],"this":[31,91],"study":[32,76,158],"is":[33,151],"automate":[35],"the":[36,75,78,94,125,128,133,152,155,180],"process":[37],"producing":[39,161],"intelligence,":[42],"focusing":[43],"on":[44,197],"vulnerabilities.":[48],"To":[49,67],"achieve":[50],"our":[51,189],"goal,":[52],"we":[53],"have":[54],"developed":[55],"a":[56],"system":[57,131],"called":[58],"cti-for-css.":[59],"Deep":[60],"learning":[61],"algorithms":[62,87],"were":[63,88,103],"used":[64],"detection.":[66],"simplify":[68],"data":[69],"representation":[70],"reduce":[72],"pre-processing":[73],"workload,":[74],"proposes":[77],"function-as-sentence":[79],"approach.":[80],"MLP,":[82],"OneDNN,":[83],"LSTM,":[84],"Bi-LSTM":[86],"trained":[89],"using":[90,136,165,188],"approach":[92],"with":[93,138],"SOSP":[95],"NDSS18":[97],"binary":[98],"datasets,":[99],"their":[101],"results":[102,120],"compared.":[104],"aforementioned":[106],"datasets":[107],"contain":[108],"buffer":[109],"error":[110,116],"vulnerabilities":[111,117],"(CWE-119)":[112],"resource":[114],"management":[115],"(CWE-399).":[118],"Our":[119],"are":[121],"as":[122,124],"successful":[123],"studies":[126],"in":[127,154,173,193],"literature.":[129,156],"achieved":[132],"best":[134,153],"performance":[135],"Bi-LSTM,":[137],"F1":[139],"score":[140,145],"82.4%.":[142],"Additionally,":[143],"AUC":[144],"93.0%":[147],"was":[148,171,186,191],"acquired,":[149],"which":[150,185],"concluded":[159],"by":[160],"software.":[168],"Shareable":[169],"produced":[172],"an":[174],"average":[175],"0.1":[177],"s,":[178],"excluding":[179],"detection":[181],"process.":[182],"Each":[183],"record,":[184],"represented":[187],"approach,":[190],"classified":[192],"under":[194],"0.32":[195],"s":[196],"average.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2025-10-10T00:00:00"}
