{"id":"https://openalex.org/W4402963999","doi":"https://doi.org/10.1093/comjnl/bxae084","title":"P-TIMA: a framework of T witter threat intelligence mining and analysis based on a prompt-learning NER model","display_name":"P-TIMA: a framework of T witter threat intelligence mining and analysis based on a prompt-learning NER model","publication_year":2024,"publication_date":"2024-09-29","ids":{"openalex":"https://openalex.org/W4402963999","doi":"https://doi.org/10.1093/comjnl/bxae084"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxae084","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxae084","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031493268","display_name":"Yizhe You","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yizhe You","raw_affiliation_strings":["Institute of Information Engineering , Chinese Academy of Sciences, No. 19 Shucun Rd, Haidian District, Beijing 100085,","School of Cyber Security, University of Chinese Academy of Sciences , No. 1 Yanqihu East Rd, Huairou District, Beijing 101408,"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering , Chinese Academy of Sciences, No. 19 Shucun Rd, Haidian District, Beijing 100085,","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences , No. 1 Yanqihu East Rd, Huairou District, Beijing 101408,","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020151253","display_name":"Zhengwei Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengwei Jiang","raw_affiliation_strings":["Institute of Information Engineering , Chinese Academy of Sciences, No. 19 Shucun Rd, Haidian District, Beijing 100085,","School of Cyber Security, University of Chinese Academy of Sciences , No. 1 Yanqihu East Rd, Huairou District, Beijing 101408,"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering , Chinese Academy of Sciences, No. 19 Shucun Rd, Haidian District, Beijing 100085,","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences , No. 1 Yanqihu East Rd, Huairou District, Beijing 101408,","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114045326","display_name":"Peian Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peian Yang","raw_affiliation_strings":["Institute of Information Engineering , Chinese Academy of Sciences, No. 19 Shucun Rd, Haidian District, Beijing 100085,"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering , Chinese Academy of Sciences, No. 19 Shucun Rd, Haidian District, Beijing 100085,","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011671643","display_name":"Jun Jiang","orcid":"https://orcid.org/0000-0003-1147-3666"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Jiang","raw_affiliation_strings":["Institute of Information Engineering , Chinese Academy of Sciences, No. 19 Shucun Rd, Haidian District, Beijing 100085,","School of Cyber Security, University of Chinese Academy of Sciences , No. 1 Yanqihu East Rd, Huairou District, Beijing 101408,"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering , Chinese Academy of Sciences, No. 19 Shucun Rd, Haidian District, Beijing 100085,","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences , No. 1 Yanqihu East Rd, Huairou District, Beijing 101408,","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103227343","display_name":"Kai Zhang","orcid":"https://orcid.org/0000-0002-6550-6518"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Zhang","raw_affiliation_strings":["Institute of Information Engineering , Chinese Academy of Sciences, No. 19 Shucun Rd, Haidian District, Beijing 100085,"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering , Chinese Academy of Sciences, No. 19 Shucun Rd, Haidian District, Beijing 100085,","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079647672","display_name":"Xuren Wang","orcid":"https://orcid.org/0000-0003-4959-0454"},"institutions":[{"id":"https://openalex.org/I96852419","display_name":"Capital Normal University","ror":"https://ror.org/005edt527","country_code":"CN","type":"education","lineage":["https://openalex.org/I96852419"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuren Wang","raw_affiliation_strings":["Information Engineering College , Capital Normal University, 105 West Third Ring Road North, Haidian District, Beijing 100048,"],"affiliations":[{"raw_affiliation_string":"Information Engineering College , Capital Normal University, 105 West Third Ring Road North, Haidian District, Beijing 100048,","institution_ids":["https://openalex.org/I96852419"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113408404","display_name":"Chenpeng Tu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenpeng Tu","raw_affiliation_strings":["Institute of Information Engineering , Chinese Academy of Sciences, No. 19 Shucun Rd, Haidian District, Beijing 100085,","School of Cyber Security , University of Chinese Academy of Sciences, No. 1 Yanqihu East Rd, Huairou District, Beijing 101408,"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering , Chinese Academy of Sciences, No. 19 Shucun Rd, Haidian District, Beijing 100085,","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security , University of Chinese Academy of Sciences, No. 1 Yanqihu East Rd, Huairou District, Beijing 101408,","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056412945","display_name":"Huamin Feng","orcid":"https://orcid.org/0000-0003-4893-7540"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huamin Feng","raw_affiliation_strings":["Beijing Electronic Science and Technology Institute , No. 7 Fufeng Road, Fengtai District, Beijing 100070,"],"affiliations":[{"raw_affiliation_string":"Beijing Electronic Science and Technology Institute , No. 7 Fufeng Road, Fengtai District, Beijing 100070,","institution_ids":["https://openalex.org/I202334528"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5031493268"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25941898,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"67","issue":"12","first_page":"3221","last_page":"3238"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7076286673545837},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5489802360534668},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4861399829387665},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4668387174606323},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3923022747039795},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36965346336364746},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.351448655128479}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7076286673545837},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5489802360534668},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4861399829387665},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4668387174606323},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3923022747039795},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36965346336364746},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.351448655128479}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxae084","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxae084","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W2592128043","https://openalex.org/W2606042658","https://openalex.org/W2896457183","https://openalex.org/W2916835129","https://openalex.org/W2934951104","https://openalex.org/W2946676565","https://openalex.org/W3013136547","https://openalex.org/W3042672578","https://openalex.org/W3048511485","https://openalex.org/W3090249280","https://openalex.org/W3092319130","https://openalex.org/W3093190191","https://openalex.org/W3111875330","https://openalex.org/W3121457173","https://openalex.org/W3127483686","https://openalex.org/W3153427360","https://openalex.org/W3159323798","https://openalex.org/W3176489198","https://openalex.org/W3185341429","https://openalex.org/W3188542058","https://openalex.org/W3201983976","https://openalex.org/W3204877722","https://openalex.org/W4280511617","https://openalex.org/W4286375281","https://openalex.org/W4321794010","https://openalex.org/W4384918448","https://openalex.org/W6679775712","https://openalex.org/W6691431627","https://openalex.org/W6763286419","https://openalex.org/W6764620215","https://openalex.org/W6766458556","https://openalex.org/W6769997091","https://openalex.org/W6773570917","https://openalex.org/W6776447483","https://openalex.org/W6779436535","https://openalex.org/W6781614840","https://openalex.org/W6781817112","https://openalex.org/W6787644907","https://openalex.org/W6788396977","https://openalex.org/W6793853352","https://openalex.org/W6793981925","https://openalex.org/W6797724200","https://openalex.org/W6798152660","https://openalex.org/W6801005489","https://openalex.org/W6801377442","https://openalex.org/W6806599246","https://openalex.org/W6809449516","https://openalex.org/W6840596876","https://openalex.org/W6845705100","https://openalex.org/W6854866820"],"related_works":["https://openalex.org/W2055243143","https://openalex.org/W2095999892","https://openalex.org/W2018764758","https://openalex.org/W2383689843","https://openalex.org/W1550668881","https://openalex.org/W617913288","https://openalex.org/W2062873522","https://openalex.org/W2319323865","https://openalex.org/W2951745010","https://openalex.org/W1986418932"],"abstract_inverted_index":{"Abstract":[0],"Open-source":[1],"information":[2],"platforms":[3],"such":[4,56],"as":[5,57],"Twitter":[6,31,179],"continuously":[7],"provide":[8],"the":[9,117,135,145,151,155,192,221],"latest":[10,222],"threat":[11,22,28,40,53,88,175,211,223],"intelligence,":[12],"including":[13],"new":[14],"vulnerabilities":[15],"and":[16,73,86,115,149,162,191,206,225],"in-the-wild":[17,126],"exploitations":[18],"of":[19,27,64,129,195],"advanced":[20],"persistent":[21],"(APT)":[23],"groups.":[24,131,197],"Automated":[25],"extraction":[26],"intelligence":[29,54,89,109,120,128,176,212],"from":[30,90,110,122,177,213],"has":[32],"become":[33],"crucial":[34],"for":[35,84,209],"defenders":[36,216],"to":[37,51,106,172,217],"access":[38],"up-to-date":[39,219],"knowledge.":[41],"However,":[42],"existing":[43],"studies":[44],"mainly":[45],"rely":[46],"on":[47,76,103,154,159],"supervised":[48],"learning":[49],"methods":[50],"extract":[52,107,173],"knowledge,":[55],"entities,":[58],"which":[59],"require":[60],"a":[61,80,203],"large":[62,156],"amount":[63],"annotated":[65],"data.":[66,180],"This":[67],"paper":[68],"presents":[69],"Threat":[70],"Intelligence":[71],"Mining":[72],"Analysis":[74],"based":[75,153],"Prompt":[77],"Learning":[78],"(P-TIMA),":[79],"framework":[81,201],"specifically":[82],"crafted":[83],"extracting":[85,210],"analyzing":[87],"Twitter.":[91,111],"P-TIMA":[92,113,171],"employs":[93],"our":[94,167,200],"innovative":[95],"few-shot":[96],"entity":[97,137],"recognition":[98,138,160],"method,":[99],"SecEntPrompt":[100],"(SEP),":[101],"built":[102],"prompt":[104],"learning,":[105],"vulnerability":[108,119,189],"Additionally,":[112],"analyzes":[114],"profiles":[116],"overarching":[118],"obtained":[121],"Twitter,":[123,214],"along":[124],"with":[125,144,220],"exploitation":[127,193],"APT":[130,196],"The":[132],"SEP":[133],"improves":[134],"average":[136],"F1":[139],"score":[140],"by":[141],"3.62-4.40":[142],"compared":[143],"best-performing":[146],"comparison":[147],"model":[148,158],"outperforms":[150],"method":[152,208],"language":[157],"performance":[161],"inference":[163],"time.":[164],"To":[165],"validate":[166],"framework,":[168],"we":[169,184],"apply":[170],"vulnerability-related":[174],"real":[178],"Through":[181],"case":[182],"studies,":[183],"then":[185],"analyze":[186],"trends":[187,224],"in":[188],"threats":[190],"capabilities":[194],"In":[198],"conclusion,":[199],"provides":[202],"more":[204],"efficient":[205],"accurate":[207],"enabling":[215],"stay":[218],"helping":[226],"them":[227],"improve":[228],"their":[229],"defense":[230],"strategies":[231],"against":[232],"cyber":[233],"attacks.":[234]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
