{"id":"https://openalex.org/W4320024310","doi":"https://doi.org/10.1109/bigdata55660.2022.10020397","title":"Threat Miner - A Text Analysis Engine for Threat Identification Using Dark Web Data","display_name":"Threat Miner - A Text Analysis Engine for Threat Identification Using Dark Web Data","publication_year":2022,"publication_date":"2022-12-17","ids":{"openalex":"https://openalex.org/W4320024310","doi":"https://doi.org/10.1109/bigdata55660.2022.10020397"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata55660.2022.10020397","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata55660.2022.10020397","pdf_url":null,"source":{"id":"https://openalex.org/S4363607709","display_name":"2022 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035020663","display_name":"Nathan Deguara","orcid":null},"institutions":[{"id":"https://openalex.org/I12870472","display_name":"Birmingham City University","ror":"https://ror.org/00t67pt25","country_code":"GB","type":"education","lineage":["https://openalex.org/I12870472"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Nathan Deguara","raw_affiliation_strings":["Birmingham City University,Birmingham,UK","Birmingham City University, Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"Birmingham City University,Birmingham,UK","institution_ids":["https://openalex.org/I12870472"]},{"raw_affiliation_string":"Birmingham City University, Birmingham, UK","institution_ids":["https://openalex.org/I12870472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050335396","display_name":"Junaid Arshad","orcid":"https://orcid.org/0000-0003-0424-9498"},"institutions":[{"id":"https://openalex.org/I12870472","display_name":"Birmingham City University","ror":"https://ror.org/00t67pt25","country_code":"GB","type":"education","lineage":["https://openalex.org/I12870472"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Junaid Arshad","raw_affiliation_strings":["Birmingham City University,Birmingham,UK","Birmingham City University, Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"Birmingham City University,Birmingham,UK","institution_ids":["https://openalex.org/I12870472"]},{"raw_affiliation_string":"Birmingham City University, Birmingham, UK","institution_ids":["https://openalex.org/I12870472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018941427","display_name":"Anum Paracha","orcid":"https://orcid.org/0000-0003-0005-2153"},"institutions":[{"id":"https://openalex.org/I12870472","display_name":"Birmingham City University","ror":"https://ror.org/00t67pt25","country_code":"GB","type":"education","lineage":["https://openalex.org/I12870472"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Anum Paracha","raw_affiliation_strings":["Birmingham City University,Birmingham,UK","Birmingham City University, Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"Birmingham City University,Birmingham,UK","institution_ids":["https://openalex.org/I12870472"]},{"raw_affiliation_string":"Birmingham City University, Birmingham, UK","institution_ids":["https://openalex.org/I12870472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072773792","display_name":"Muhammad Ajmal Azad","orcid":"https://orcid.org/0000-0003-1707-018X"},"institutions":[{"id":"https://openalex.org/I12870472","display_name":"Birmingham City University","ror":"https://ror.org/00t67pt25","country_code":"GB","type":"education","lineage":["https://openalex.org/I12870472"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Muhammad Ajmal Azad","raw_affiliation_strings":["Birmingham City University,Birmingham,UK","Birmingham City University, Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"Birmingham City University,Birmingham,UK","institution_ids":["https://openalex.org/I12870472"]},{"raw_affiliation_string":"Birmingham City University, Birmingham, UK","institution_ids":["https://openalex.org/I12870472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5035020663"],"corresponding_institution_ids":["https://openalex.org/I12870472"],"apc_list":null,"apc_paid":null,"fwci":1.6007,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.86542923,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"3043","last_page":"3052"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bespoke","display_name":"Bespoke","score":0.8506293296813965},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6986371278762817},{"id":"https://openalex.org/keywords/deep-web","display_name":"Deep Web","score":0.6840084791183472},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6577683687210083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.588169515132904},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5382423400878906},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.39202016592025757},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3892560601234436},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12870872020721436}],"concepts":[{"id":"https://openalex.org/C44210515","wikidata":"https://www.wikidata.org/wiki/Q16968978","display_name":"Bespoke","level":2,"score":0.8506293296813965},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6986371278762817},{"id":"https://openalex.org/C46721378","wikidata":"https://www.wikidata.org/wiki/Q221989","display_name":"Deep Web","level":3,"score":0.6840084791183472},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6577683687210083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.588169515132904},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5382423400878906},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.39202016592025757},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3892560601234436},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12870872020721436},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/bigdata55660.2022.10020397","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata55660.2022.10020397","pdf_url":null,"source":{"id":"https://openalex.org/S4363607709","display_name":"2022 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},{"id":"pmh:oai:www.open-access.bcu.ac.uk:13975","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402654","display_name":"BCU Open Access Repository (Birmingham City University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I12870472","host_organization_name":"Birmingham City University","host_organization_lineage":["https://openalex.org/I12870472"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2019759670","https://openalex.org/W2024570182","https://openalex.org/W2077718724","https://openalex.org/W2109960355","https://openalex.org/W2746645771","https://openalex.org/W2782101021","https://openalex.org/W2798110387","https://openalex.org/W2886325293","https://openalex.org/W2908121058","https://openalex.org/W2914403931","https://openalex.org/W2954548380","https://openalex.org/W2957698615","https://openalex.org/W3007432608","https://openalex.org/W3008445684","https://openalex.org/W3036307951","https://openalex.org/W3090159053","https://openalex.org/W3112923882","https://openalex.org/W3116201078","https://openalex.org/W3121480663","https://openalex.org/W3139195413","https://openalex.org/W3144041472","https://openalex.org/W3202952191","https://openalex.org/W3210139582","https://openalex.org/W4211048839","https://openalex.org/W4255111644","https://openalex.org/W4280596655","https://openalex.org/W4321381866","https://openalex.org/W6626784898","https://openalex.org/W6803700747","https://openalex.org/W6850706855","https://openalex.org/W7008810003"],"related_works":["https://openalex.org/W2181465263","https://openalex.org/W3093969907","https://openalex.org/W3202725889","https://openalex.org/W2232750048","https://openalex.org/W3048799479","https://openalex.org/W3006507989","https://openalex.org/W2779961139","https://openalex.org/W4240241597","https://openalex.org/W2763500028","https://openalex.org/W4240288358"],"abstract_inverted_index":{"Cyber":[0],"threats":[1],"continue":[2],"to":[3,8,20,54,66,81,127,154],"grow":[4],"with":[5,44,130,149],"novel":[6],"methods":[7,34],"attack":[9],"computing":[10],"systems,":[11],"highlighting":[12],"the":[13,45,49,61,137,150,156,159],"need":[14],"for":[15],"sophisticated":[16],"mechanisms":[17,29,69],"and":[18,58,96,107],"techniques":[19,106],"protect":[21],"against":[22,170],"such":[23,64],"dynamic":[24],"threats.":[25,172],"Contemporary":[26],"cyber":[27,171],"defence":[28,68,168],"utilise":[30],"a":[31,83,109,140],"range":[32],"of":[33,48,63,139,143,158],"which":[35,89,146],"rely":[36],"on":[37],"monitoring":[38],"network":[39],"or":[40],"system-level":[41],"events.":[42],"However,":[43],"growing":[46],"use":[47,62],"dark":[50,93,119],"web":[51,94,120],"by":[52],"mal-actors":[53],"share":[55],"exploits,":[56],"breaches,":[57],"data":[59,91],"leaks,":[60],"information":[65,117],"strengthen":[67],"becomes":[70],"an":[71],"intriguing":[72],"prospect.":[73],"In":[74],"this":[75],"paper,":[76],"we":[77],"present":[78,136],"our":[79,144],"efforts":[80],"develop":[82],"text":[84],"mining":[85],"engine":[86],"(Threat":[87],"Miner)":[88],"analyses":[90],"from":[92,118],"forums":[95,121],"transforms":[97],"it":[98,126],"into":[99,122],"actionable":[100],"intelligence.":[101],"Leveraging":[102],"cutting-edge":[103],"machine":[104],"learning":[105],"utilising":[108],"bespoke":[110],"threat":[111,131],"dictionary,":[112],"Threat":[113],"Miner":[114],"extracts":[115],"useful":[116],"STIX":[123],"form,":[124],"enabling":[125],"be":[128],"used":[129],"intelligence":[132],"platforms.":[133],"We":[134],"also":[135],"results":[138],"thorough":[141],"evaluation":[142],"scheme":[145],"was":[147],"conducted":[148],"CrimeBB":[151],"dataset":[152],"[1]":[153],"understand":[155],"feasibility":[157],"approach":[160],"as":[161,163],"well":[162],"its":[164],"effectiveness":[165],"in":[166],"strengthening":[167],"capability":[169]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
