{"id":"https://openalex.org/W2914789242","doi":"https://doi.org/10.1109/bigdata.2018.8622506","title":"Corpus and Deep Learning Classifier for Collection of Cyber Threat Indicators in Twitter Stream","display_name":"Corpus and Deep Learning Classifier for Collection of Cyber Threat Indicators in Twitter Stream","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2914789242","doi":"https://doi.org/10.1109/bigdata.2018.8622506","mag":"2914789242"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata.2018.8622506","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2018.8622506","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062734917","display_name":"Vahid Behzadan","orcid":null},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vahid Behzadan","raw_affiliation_strings":["Department of Computer Science, Kansas State University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kansas State University","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101797267","display_name":"Carlos Aguirre","orcid":null},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Carlos Aguirre","raw_affiliation_strings":["Department of Computer Science, Kansas State University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kansas State University","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103875788","display_name":"Avishek Joey Bose","orcid":null},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Avishek Bose","raw_affiliation_strings":["Department of Computer Science, Kansas State University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kansas State University","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016291944","display_name":"William Hsu","orcid":"https://orcid.org/0000-0002-5168-070X"},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"William Hsu","raw_affiliation_strings":["Department of Computer Science, Kansas State University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kansas State University","institution_ids":["https://openalex.org/I189590672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5062734917"],"corresponding_institution_ids":["https://openalex.org/I189590672"],"apc_list":null,"apc_paid":null,"fwci":11.4049,"has_fulltext":false,"cited_by_count":54,"citation_normalized_percentile":{"value":0.98174438,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"5002","last_page":"5007"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8130756616592407},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.738426923751831},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.7349420189857483},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7259103655815125},{"id":"https://openalex.org/keywords/binary-classification","display_name":"Binary classification","score":0.6317547559738159},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5371018648147583},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4633052945137024},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4439114034175873},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.43687704205513},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.418855220079422},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3841262757778168},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3684278726577759},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1925238072872162},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.0823211669921875}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8130756616592407},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.738426923751831},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.7349420189857483},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7259103655815125},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.6317547559738159},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5371018648147583},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4633052945137024},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4439114034175873},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.43687704205513},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.418855220079422},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3841262757778168},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3684278726577759},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1925238072872162},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.0823211669921875},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata.2018.8622506","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2018.8622506","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5199999809265137,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W84853486","https://openalex.org/W1522301498","https://openalex.org/W1707806712","https://openalex.org/W2131571251","https://openalex.org/W2132083787","https://openalex.org/W2143017621","https://openalex.org/W2270414365","https://openalex.org/W2342299174","https://openalex.org/W2472414028","https://openalex.org/W2477560686","https://openalex.org/W2484331308","https://openalex.org/W2495465557","https://openalex.org/W2579353374","https://openalex.org/W2593589299","https://openalex.org/W2743411104","https://openalex.org/W2782670588","https://openalex.org/W2799224341","https://openalex.org/W2801060237","https://openalex.org/W2962892082","https://openalex.org/W2964121744","https://openalex.org/W4239319433","https://openalex.org/W4245267204","https://openalex.org/W4298872063","https://openalex.org/W6631190155","https://openalex.org/W6637554470","https://openalex.org/W6732499259","https://openalex.org/W6747685716"],"related_works":["https://openalex.org/W4401664841","https://openalex.org/W3215166534","https://openalex.org/W3205687007","https://openalex.org/W4401705120","https://openalex.org/W611119698","https://openalex.org/W4300817267","https://openalex.org/W4402736160","https://openalex.org/W4382934300","https://openalex.org/W2121061354","https://openalex.org/W4285388059"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,37,54,63,72],"framework":[4,35],"for":[5,40,66,75],"detection":[6,67],"and":[7,29,42,71,102],"classification":[8,43,77],"of":[9,21,32,44,62,68,78,84,93],"cyber":[10,85],"threat":[11],"indicators":[12],"in":[13,105],"the":[14,19,76,100],"Twitter":[15],"stream.":[16],"Contrary":[17],"to":[18,49,98],"bulk":[20],"similar":[22],"proposals":[23],"that":[24,46],"rely":[25],"on":[26],"manually-designed":[27],"heuristics":[28],"keywordbased":[30],"filtering":[31],"tweets,":[33,70],"our":[34],"provides":[36],"data-driven":[38],"approach":[39],"modeling":[41],"tweets":[45,80,97],"are":[47],"related":[48],"cybersecurity":[50],"events.":[51],"We":[52],"present":[53,89],"cascaded":[55],"Convolutional":[56],"Neural":[57],"Network":[58],"(CNN)":[59],"architecture,":[60],"comprised":[61],"binary":[64],"classifier":[65],"cyber-related":[69,79,96],"multi-class":[73],"model":[74],"into":[81],"multiple":[82],"types":[83],"threats.":[86],"Furthermore,":[87],"we":[88],"an":[90],"open-source":[91],"dataset":[92],"21000":[94],"annotated":[95],"facilitate":[99],"validation":[101],"further":[103],"research":[104],"this":[106],"area.":[107]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
