{"id":"https://openalex.org/W2109614975","doi":"https://doi.org/10.1109/isi.2010.5484737","title":"Text analysis and entity extraction in asymmetric threat response and prediction","display_name":"Text analysis and entity extraction in asymmetric threat response and prediction","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W2109614975","doi":"https://doi.org/10.1109/isi.2010.5484737","mag":"2109614975"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2010.5484737","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2010.5484737","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081399516","display_name":"Erwin Chan","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Erwin Chan","raw_affiliation_strings":["Department of Linguistics, University of Arizona Tucson, USA","Dept. of Linguistics, University of Arizona, USA"],"affiliations":[{"raw_affiliation_string":"Department of Linguistics, University of Arizona Tucson, USA","institution_ids":["https://openalex.org/I138006243"]},{"raw_affiliation_string":"Dept. of Linguistics, University of Arizona, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083544212","display_name":"Jason Ginsburg","orcid":"https://orcid.org/0000-0001-7783-0721"},"institutions":[{"id":"https://openalex.org/I141591182","display_name":"University of Aizu","ror":"https://ror.org/02pg0e883","country_code":"JP","type":"education","lineage":["https://openalex.org/I141591182"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Jason Ginsburg","raw_affiliation_strings":["Center for Language Research, University of Aizu, Japan"],"affiliations":[{"raw_affiliation_string":"Center for Language Research, University of Aizu, Japan","institution_ids":["https://openalex.org/I141591182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006488062","display_name":"Brian Ten Eyck","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brian Ten Eyck","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Arizona Tucson, USA","Department of Electrical and Computer Engineering, University of Arizona, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Arizona Tucson, USA","institution_ids":["https://openalex.org/I138006243"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Arizona, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020169647","display_name":"Jerzy W. Rozenblit","orcid":"https://orcid.org/0000-0002-7348-4128"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jerzy Rozenblit","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Arizona Tucson, USA","Department of Electrical and Computer Engineering, University of Arizona, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Arizona Tucson, USA","institution_ids":["https://openalex.org/I138006243"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Arizona, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040435157","display_name":"Mike Dameron","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mike Dameron","raw_affiliation_strings":["Ephibian, Tucson, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Ephibian, Tucson, AZ, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5081399516"],"corresponding_institution_ids":["https://openalex.org/I138006243"],"apc_list":null,"apc_paid":null,"fwci":0.9021,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.81004308,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"19","issue":null,"first_page":"202","last_page":"207"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7982098460197449},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.6805334687232971},{"id":"https://openalex.org/keywords/intelligence-analysis","display_name":"Intelligence analysis","score":0.5733394622802734},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.569241464138031},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5182323455810547},{"id":"https://openalex.org/keywords/parsing","display_name":"Parsing","score":0.4501674771308899},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.44023776054382324},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43358489871025085},{"id":"https://openalex.org/keywords/data-visualization","display_name":"Data visualization","score":0.43350082635879517},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.423096239566803},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4029194712638855},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.379673033952713},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1642059087753296}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7982098460197449},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.6805334687232971},{"id":"https://openalex.org/C517642484","wikidata":"https://www.wikidata.org/wiki/Q2388514","display_name":"Intelligence analysis","level":2,"score":0.5733394622802734},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.569241464138031},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5182323455810547},{"id":"https://openalex.org/C186644900","wikidata":"https://www.wikidata.org/wiki/Q194152","display_name":"Parsing","level":2,"score":0.4501674771308899},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.44023776054382324},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43358489871025085},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.43350082635879517},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.423096239566803},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4029194712638855},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.379673033952713},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1642059087753296},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2010.5484737","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2010.5484737","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W48206436","https://openalex.org/W59466250","https://openalex.org/W1774901127","https://openalex.org/W2001724815","https://openalex.org/W2068882115","https://openalex.org/W2104131857","https://openalex.org/W2144578941","https://openalex.org/W2161676054","https://openalex.org/W2164749476","https://openalex.org/W2952087486","https://openalex.org/W6601901250","https://openalex.org/W6602438301","https://openalex.org/W6638035003","https://openalex.org/W6683693062"],"related_works":["https://openalex.org/W4225274103","https://openalex.org/W2013728941","https://openalex.org/W2154046714","https://openalex.org/W2579659702","https://openalex.org/W2189613078","https://openalex.org/W1574055964","https://openalex.org/W2923661510","https://openalex.org/W3003759491","https://openalex.org/W2542318691","https://openalex.org/W2547096368"],"abstract_inverted_index":{"The":[0],"Asymmetric":[1],"Threat":[2],"Response":[3],"and":[4,17,28,32,42,45,58,77,97,101,112],"Analysis":[5],"Program":[6],"(ATRAP)":[7],"is":[8],"a":[9,22],"software":[10],"system":[11,84],"for":[12,26],"intelligence":[13,75,110],"fusion,":[14],"visualization,":[15],"reasoning,":[16],"prediction.":[18],"ATRAP":[19],"consists":[20],"of":[21,24,49,51,71,82,109],"set":[23],"tools":[25],"annotating":[27],"automatically":[29],"extracting":[30],"entities":[31],"relationships":[33],"from":[34],"documents,":[35],"visualizing":[36],"this":[37,64],"information":[38],"in":[39,74],"relational,":[40],"geographic,":[41],"temporal":[43],"dimensions,":[44],"determining":[46],"future":[47],"courses":[48],"action":[50],"adversaries":[52],"by":[53],"creating":[54],"situational":[55],"threat":[56],"templates":[57],"applying":[59],"customized":[60],"prediction":[61,102],"algorithms.":[62],"In":[63],"paper,":[65],"we":[66,105],"first":[67],"describe":[68,106,113],"the":[69,86,90,98],"task":[70],"analyzing":[72],"data":[73],"reports,":[76,111],"then":[78],"provide":[79],"an":[80],"overview":[81],"major":[83],"components:":[85],"Text":[87],"Highlighter":[88],"tool,":[89],"ThoughtSpace":[91],"<sup":[92],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[93],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">TM</sup>":[94],"visualization":[95],"environment,":[96],"Template":[99],"Builder":[100],"tool.":[103],"Subsequently,":[104],"linguistic":[107],"characteristics":[108],"ATRAP's":[114],"named":[115],"entity":[116],"recognition":[117],"system.":[118]},"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
