{"id":"https://openalex.org/W3197530643","doi":"https://doi.org/10.1109/csr51186.2021.9527964","title":"Social Media Monitoring for IoT Cyber-Threats","display_name":"Social Media Monitoring for IoT Cyber-Threats","publication_year":2021,"publication_date":"2021-07-26","ids":{"openalex":"https://openalex.org/W3197530643","doi":"https://doi.org/10.1109/csr51186.2021.9527964","mag":"3197530643"},"language":"en","primary_location":{"id":"doi:10.1109/csr51186.2021.9527964","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr51186.2021.9527964","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2109.04306","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022367437","display_name":"Sofia Alevizopoulou","orcid":"https://orcid.org/0000-0003-4305-5469"},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Sofia Alevizopoulou","raw_affiliation_strings":["University of the Peloponnese,Dept. of Informatics & Telecommunications,Tripolis,Greece,GR22131"],"affiliations":[{"raw_affiliation_string":"University of the Peloponnese,Dept. of Informatics & Telecommunications,Tripolis,Greece,GR22131","institution_ids":["https://openalex.org/I158716096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046481193","display_name":"Paris Koloveas","orcid":"https://orcid.org/0000-0003-2376-089X"},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Paris Koloveas","raw_affiliation_strings":["University of the Peloponnese,Dept. of Informatics & Telecommunications,Tripolis,Greece,GR22131"],"affiliations":[{"raw_affiliation_string":"University of the Peloponnese,Dept. of Informatics & Telecommunications,Tripolis,Greece,GR22131","institution_ids":["https://openalex.org/I158716096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090010728","display_name":"Christos Tryfonopoulos","orcid":"https://orcid.org/0000-0003-0640-9088"},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Christos Tryfonopoulos","raw_affiliation_strings":["University of the Peloponnese,Dept. of Informatics & Telecommunications,Tripolis,Greece,GR22131"],"affiliations":[{"raw_affiliation_string":"University of the Peloponnese,Dept. of Informatics & Telecommunications,Tripolis,Greece,GR22131","institution_ids":["https://openalex.org/I158716096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018529678","display_name":"Paraskevi Raftopoulou","orcid":"https://orcid.org/0000-0003-0663-4322"},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Paraskevi Raftopoulou","raw_affiliation_strings":["University of the Peloponnese,Dept. of Informatics & Telecommunications,Tripolis,Greece,GR22131"],"affiliations":[{"raw_affiliation_string":"University of the Peloponnese,Dept. of Informatics & Telecommunications,Tripolis,Greece,GR22131","institution_ids":["https://openalex.org/I158716096"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022367437"],"corresponding_institution_ids":["https://openalex.org/I158716096"],"apc_list":null,"apc_paid":null,"fwci":0.7964,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.74553744,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"436","last_page":"441"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8675937056541443},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8191196918487549},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.5981950759887695},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5923589468002319},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5741525292396545},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5658360123634338},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.552492082118988},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5128679275512695},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4592878520488739},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.42451241612434387},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4223910868167877},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2188568115234375}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8675937056541443},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8191196918487549},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.5981950759887695},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5923589468002319},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5741525292396545},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5658360123634338},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.552492082118988},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5128679275512695},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4592878520488739},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.42451241612434387},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4223910868167877},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2188568115234375},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/csr51186.2021.9527964","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr51186.2021.9527964","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2109.04306","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2109.04306","pdf_url":"https://arxiv.org/pdf/2109.04306","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2109.04306","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2109.04306","pdf_url":"https://arxiv.org/pdf/2109.04306","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/5","score":0.5099999904632568,"display_name":"Gender equality"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W179179905","https://openalex.org/W1528905581","https://openalex.org/W1532325895","https://openalex.org/W1553724776","https://openalex.org/W1707806712","https://openalex.org/W1985258161","https://openalex.org/W2047468043","https://openalex.org/W2101234009","https://openalex.org/W2119821739","https://openalex.org/W2149706766","https://openalex.org/W2472414028","https://openalex.org/W2732608405","https://openalex.org/W2766961112","https://openalex.org/W2769379504","https://openalex.org/W2772066257","https://openalex.org/W2793157084","https://openalex.org/W2794016958","https://openalex.org/W2811348957","https://openalex.org/W2888251217","https://openalex.org/W2911964244","https://openalex.org/W2920420505","https://openalex.org/W2956004635","https://openalex.org/W2962892082","https://openalex.org/W2971169422","https://openalex.org/W2994553655","https://openalex.org/W3038151835","https://openalex.org/W3039878631","https://openalex.org/W3140746202","https://openalex.org/W3141363959","https://openalex.org/W3201239072","https://openalex.org/W4213009331","https://openalex.org/W4229658977","https://openalex.org/W4236137412","https://openalex.org/W4238530616","https://openalex.org/W4239319433","https://openalex.org/W4239510810","https://openalex.org/W6607259140","https://openalex.org/W6637554470","https://openalex.org/W6646789938","https://openalex.org/W6675354045","https://openalex.org/W6720404348","https://openalex.org/W6745561309","https://openalex.org/W6749470980","https://openalex.org/W6750005347"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4312814274","https://openalex.org/W2906845177","https://openalex.org/W4200107511","https://openalex.org/W2891427086","https://openalex.org/W1968625315"],"abstract_inverted_index":{"The":[0],"rapid":[1],"development":[2],"of":[3,12,21,31,158],"IoT":[4,33,54,132,145],"applications":[5],"and":[6,25,48,76,89,102,142,154],"their":[7],"use":[8],"in":[9,17],"various":[10,45],"fields":[11],"everyday":[13],"life":[14],"has":[15,26,60],"resulted":[16],"an":[18],"escalated":[19],"number":[20],"different":[22,93],"possible":[23],"cyber-threats,":[24],"consequently":[27],"raised":[28],"the":[29,83,108,113,131,134,152,156],"need":[30],"securing":[32],"devices.":[34,146],"Collecting":[35],"Cyber-Threat":[36,79],"Intelligence":[37,80],"(e.g.,":[38],"zero-day":[39],"vulnerabilities":[40,141],"or":[41,56],"trending":[42],"exploits)":[43],"from":[44,82,107],"online":[46],"sources":[47],"utilizing":[49],"it":[50],"to":[51,62,111,130,138,148],"proactively":[52],"secure":[53],"systems":[55],"prepare":[57],"mitigation":[58],"scenarios":[59],"proven":[61],"be":[63],"a":[64,123],"promising":[65],"direction.":[66],"In":[67],"this":[68,169],"work,":[69],"we":[70,87,121,161],"focus":[71],"on":[72,118,144,151],"social":[73,125],"media":[74,126],"monitoring":[75,127],"investigate":[77],"real-time":[78],"detection":[81],"Twitter":[84,109],"stream.":[85],"Initially,":[86],"compare":[88],"extensively":[90],"evaluate":[91],"six":[92],"machine-learning":[94],"based":[95,117],"classification":[96],"alternatives":[97],"trained":[98],"with":[99,104],"vulnerability":[100],"descriptions":[101],"tested":[103],"real-world":[105],"data":[106],"stream":[110],"identify":[112,139],"best-fitting":[114],"solution.":[115],"Subsequently,":[116],"our":[119,159],"findings,":[120],"propose":[122],"novel":[124],"system":[128,135],"tailored":[129],"domain;":[133],"allows":[136],"users":[137],"recent/trending":[140],"exploits":[143],"Finally,":[147],"aid":[149],"research":[150],"field":[153],"support":[155],"reproducibility":[157],"results":[160],"publicly":[162],"release":[163],"all":[164],"annotated":[165],"datasets":[166],"created":[167],"during":[168],"process.":[170]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
