{"id":"https://openalex.org/W2907165009","doi":"https://doi.org/10.1109/isi.2018.8587336","title":"Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study","display_name":"Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2907165009","doi":"https://doi.org/10.1109/isi.2018.8587336","mag":"2907165009"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2018.8587336","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2018.8587336","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102010583","display_name":"Ryan Williams","orcid":"https://orcid.org/0009-0003-6695-5790"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ryan Williams","raw_affiliation_strings":["Management Information Systems, University of Arizona, Tucson, AZ, United States"],"affiliations":[{"raw_affiliation_string":"Management Information Systems, University of Arizona, Tucson, AZ, United States","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038811607","display_name":"Sagar Samtani","orcid":"https://orcid.org/0000-0002-4513-805X"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]},{"id":"https://openalex.org/I4210133369","display_name":"Decision Sciences (United States)","ror":"https://ror.org/03gcvf773","country_code":"US","type":"company","lineage":["https://openalex.org/I4210133369"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sagar Samtani","raw_affiliation_strings":["Information Systems and Decision Sciences, University of South Florida, Tampa, FL, United States"],"affiliations":[{"raw_affiliation_string":"Information Systems and Decision Sciences, University of South Florida, Tampa, FL, United States","institution_ids":["https://openalex.org/I2613432","https://openalex.org/I4210133369"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110548720","display_name":"Mark Patton","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mark Patton","raw_affiliation_strings":["Management Information Systems, University of Arizona, Tucson, AZ, United States"],"affiliations":[{"raw_affiliation_string":"Management Information Systems, University of Arizona, Tucson, AZ, United States","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017102020","display_name":"Hsinchun Chen","orcid":"https://orcid.org/0000-0003-3251-2433"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hsinchun Chen","raw_affiliation_strings":["Management Information Systems, University of Arizona, Tucson, AZ, United States"],"affiliations":[{"raw_affiliation_string":"Management Information Systems, University of Arizona, Tucson, AZ, United States","institution_ids":["https://openalex.org/I138006243"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102010583"],"corresponding_institution_ids":["https://openalex.org/I138006243"],"apc_list":null,"apc_paid":null,"fwci":2.4771,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.90678247,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.9713298082351685},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.833702802658081},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7943363785743713},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6169270277023315},{"id":"https://openalex.org/keywords/web-crawler","display_name":"Web crawler","score":0.49148428440093994},{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.48518162965774536},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4339999854564667},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3768497407436371}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9713298082351685},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.833702802658081},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7943363785743713},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6169270277023315},{"id":"https://openalex.org/C13743948","wikidata":"https://www.wikidata.org/wiki/Q45842","display_name":"Web crawler","level":2,"score":0.49148428440093994},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.48518162965774536},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4339999854564667},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3768497407436371}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2018.8587336","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2018.8587336","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1672113969","https://openalex.org/W1674074141","https://openalex.org/W1976216148","https://openalex.org/W2061809273","https://openalex.org/W2100464657","https://openalex.org/W2292425835","https://openalex.org/W2554200766","https://openalex.org/W2744049423","https://openalex.org/W2782101021","https://openalex.org/W2963980822","https://openalex.org/W4236259340","https://openalex.org/W6696867607"],"related_works":["https://openalex.org/W3006507989","https://openalex.org/W3163508776","https://openalex.org/W2497169483","https://openalex.org/W3176479423","https://openalex.org/W2943873441","https://openalex.org/W1987059498","https://openalex.org/W2987285902","https://openalex.org/W4292148085","https://openalex.org/W4223894744","https://openalex.org/W4285792982"],"abstract_inverted_index":{"Cyber":[0,26],"threats":[1,65],"have":[2,20,37,108],"emerged":[3],"as":[4,101],"a":[5,31,122,141],"key":[6],"societal":[7],"concern.":[8],"To":[9],"counter":[10],"the":[11,77],"growing":[12],"threat":[13],"of":[14,84,86,182],"cyber-attacks,":[15],"organizations,":[16],"in":[17,24,48],"recent":[18],"years,":[19],"begun":[21],"investing":[22],"heavily":[23],"developing":[25],"Threat":[27],"Intelligence":[28],"(CTI).":[29],"Fundamentally":[30],"data":[32,42,80],"driven":[33],"process,":[34],"many":[35,110],"organizations":[36,63],"traditionally":[38],"collected":[39,174],"and":[40,82,91,104,162,170,191],"analyzed":[41],"from":[43],"internal":[44],"log":[45],"files,":[46],"resulting":[47],"reactive":[49],"CTI.":[50,179],"The":[51,180],"online":[52],"hacker":[53,133],"community":[54],"can":[55],"offer":[56],"significant":[57],"proactive":[58],"CTI":[59,168],"value":[60],"by":[61],"alerting":[62],"to":[64,112,119,131,154,172],"they":[66],"were":[67],"not":[68],"previously":[69],"aware":[70],"of.":[71],"Amongst":[72],"various":[73],"platforms,":[74],"forums":[75,95],"provide":[76],"richest":[78],"metadata,":[79],"permanence,":[81],"tens":[83],"thousands":[85],"freely":[87],"available":[88],"Tools,":[89],"Techniques,":[90],"Procedures":[92],"(TTP).":[93],"However,":[94],"often":[96],"employ":[97,140],"anti-crawling":[98,129],"measures":[99],"such":[100],"authentication,":[102],"throttling,":[103],"obfuscation.":[105],"Such":[106],"limitations":[107],"restricted":[109],"researchers":[111,171],"batch":[113],"collections.":[114],"This":[115],"exploratory":[116],"study":[117,184],"aims":[118],"(1)":[120],"design":[121],"novel":[123],"web":[124],"crawler":[125],"augmented":[126],"with":[127],"numerous":[128],"countermeasures":[130],"collect":[132],"exploits":[134,157,175,193],"on":[135],"an":[136],"ongoing":[137],"basis,":[138],"(2)":[139],"state-of-the-art":[142],"deep":[143],"learning":[144],"approach,":[145],"Long":[146],"Short-Term":[147],"Memory":[148],"(LSTM)":[149],"Recurrent":[150],"Neural":[151],"Network":[152],"(RNN),":[153],"automatically":[155],"classify":[156],"into":[158],"pre-defined":[159],"categories":[160],"on-the-fly,":[161],"(3)":[163],"develop":[164],"interactive":[165],"visualizations":[166],"enabling":[167],"practitioners":[169],"explore":[173],"for":[176],"proactive,":[177],"timely":[178],"results":[181],"this":[183],"indicate,":[185],"among":[186],"other":[187,199],"findings,":[188],"that":[189],"system":[190],"network":[192],"are":[194],"shared":[195],"significantly":[196],"more":[197],"than":[198],"exploit":[200],"types.":[201]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
