{"id":"https://openalex.org/W2978269707","doi":"https://doi.org/10.1109/ijcnn.2019.8852142","title":"Collecting Indicators of Compromise from Unstructured Text of Cybersecurity Articles using Neural-Based Sequence Labelling","display_name":"Collecting Indicators of Compromise from Unstructured Text of Cybersecurity Articles using Neural-Based Sequence Labelling","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2978269707","doi":"https://doi.org/10.1109/ijcnn.2019.8852142","mag":"2978269707"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn.2019.8852142","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2019.8852142","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005681620","display_name":"Zi Long","orcid":null},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zi Long","raw_affiliation_strings":["Platform and Content Group, Tencent, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Platform and Content Group, Tencent, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250653659"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030309191","display_name":"Lianzhi Tan","orcid":null},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lianzhi Tan","raw_affiliation_strings":["Platform and Content Group, Tencent, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Platform and Content Group, Tencent, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250653659"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049390242","display_name":"Shengping Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengping Zhou","raw_affiliation_strings":["Platform and Content Group, Tencent, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Platform and Content Group, Tencent, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250653659"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003518978","display_name":"Chaoyang He","orcid":"https://orcid.org/0000-0003-2770-9661"},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chaoyang He","raw_affiliation_strings":["AI Lab, Tencent, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"AI Lab, Tencent, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250653659"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011513741","display_name":"Xin Liu","orcid":"https://orcid.org/0000-0002-2336-7409"},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Liu","raw_affiliation_strings":["Platform and Content Group, Tencent, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Platform and Content Group, Tencent, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250653659"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5005681620"],"corresponding_institution_ids":["https://openalex.org/I2250653659"],"apc_list":null,"apc_paid":null,"fwci":2.2242,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.8922988,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8239037990570068},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6768743991851807},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.546630859375},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5265793204307556},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5201323628425598},{"id":"https://openalex.org/keywords/test-set","display_name":"Test set","score":0.474393367767334},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.4387931823730469},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4332903027534485},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4148009419441223},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3966064453125},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3773062825202942},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34503546357154846},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09203240275382996}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8239037990570068},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6768743991851807},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.546630859375},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5265793204307556},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5201323628425598},{"id":"https://openalex.org/C169903167","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Test set","level":2,"score":0.474393367767334},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.4387931823730469},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4332903027534485},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4148009419441223},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3966064453125},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3773062825202942},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34503546357154846},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09203240275382996},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn.2019.8852142","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2019.8852142","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.49000000953674316,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1940872118","https://openalex.org/W2004228899","https://openalex.org/W2042188227","https://openalex.org/W2064675550","https://openalex.org/W2147203050","https://openalex.org/W2153579005","https://openalex.org/W2470673105","https://openalex.org/W2538057479","https://openalex.org/W2538865281","https://openalex.org/W2552553554","https://openalex.org/W2564471085","https://openalex.org/W2603197593","https://openalex.org/W2604986524","https://openalex.org/W2615487675","https://openalex.org/W2756381707","https://openalex.org/W2771963642","https://openalex.org/W2837911466","https://openalex.org/W2889191148","https://openalex.org/W2896612858","https://openalex.org/W2950938254","https://openalex.org/W2962676330","https://openalex.org/W2962739339","https://openalex.org/W2963002901","https://openalex.org/W2963403868","https://openalex.org/W2963563735","https://openalex.org/W2963625095","https://openalex.org/W2963816430","https://openalex.org/W2963956191","https://openalex.org/W2964052092","https://openalex.org/W3003159702","https://openalex.org/W3003738477","https://openalex.org/W3100921450","https://openalex.org/W4294170691","https://openalex.org/W4297748452","https://openalex.org/W4385245566","https://openalex.org/W6640362995","https://openalex.org/W6682691769","https://openalex.org/W6730033830","https://openalex.org/W6736175030","https://openalex.org/W6738256779","https://openalex.org/W6739901393","https://openalex.org/W6744233811","https://openalex.org/W6755267338","https://openalex.org/W6772942438"],"related_works":["https://openalex.org/W2801622120","https://openalex.org/W2164141394","https://openalex.org/W3036524962","https://openalex.org/W4240977217","https://openalex.org/W1967649051","https://openalex.org/W2508088450","https://openalex.org/W2389434635","https://openalex.org/W4214750239","https://openalex.org/W2279908259","https://openalex.org/W2811264706"],"abstract_inverted_index":{"Indicators":[0],"of":[1,40,55,90,109,115,124,142,155],"Compromise":[2],"(IOCs)":[3],"are":[4],"artifacts":[5],"observed":[6],"on":[7,49,144,157],"a":[8,21,94],"network":[9],"or":[10],"in":[11,27,37,121],"an":[12,28,34,65,74],"operating":[13],"system":[14],"that":[15,103,129],"can":[16],"be":[17],"utilized":[18],"to":[19,63,80],"indicate":[20],"computer":[22],"intrusion":[23],"and":[24,57,98,118,150],"detect":[25],"cyber-attacks":[26],"early":[29],"stage.":[30],"Thus,":[31],"they":[32],"exert":[33],"important":[35],"role":[36],"the":[38,104,122,130,139,152],"field":[39],"cybersecurity.":[41,91],"However,":[42],"state-of-the-art":[43],"IOCs":[44,82],"detection":[45],"systems":[46],"rely":[47],"heavily":[48],"hand-crafted":[50],"features":[51],"with":[52],"expert":[53,88],"knowledge":[54,89],"cybersecurity,":[56],"require":[58],"large-scale":[59],"manually":[60],"annotated":[61],"corpora":[62],"train":[64],"IOC":[66,125],"classifier.":[67],"In":[68],"this":[69],"paper,":[70],"we":[71,101],"propose":[72],"using":[73,93],"end-to-end":[75],"neural-based":[76],"sequence":[77,135],"labelling":[78,136],"model":[79,106,132],"identify":[81],"automatically":[83],"from":[84,113],"cybersecurity":[85,116,146],"articles":[86,117],"without":[87],"By":[92],"multi-head":[95],"self-attention":[96],"module":[97],"contextual":[99,111],"features,":[100],"find":[102],"proposed":[105,131],"is":[107],"capable":[108],"gathering":[110],"information":[112],"texts":[114],"performs":[119],"better":[120],"task":[123],"identification.":[126],"Experiments":[127],"show":[128],"outperforms":[133],"other":[134],"models,":[137],"achieving":[138],"average":[140,153],"F1-score":[141,154],"89.0%":[143],"English":[145],"article":[147],"test":[148,159],"set,":[149],"approximately":[151],"81.8%":[156],"Chinese":[158],"set.":[160]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-24T08:02:53.985720","created_date":"2025-10-10T00:00:00"}
