{"id":"https://openalex.org/W3215921998","doi":"https://doi.org/10.1109/isi53945.2021.9624857","title":"User Role Identification in Software Vulnerability Discussions over Social Networks","display_name":"User Role Identification in Software Vulnerability Discussions over Social Networks","publication_year":2021,"publication_date":"2021-11-02","ids":{"openalex":"https://openalex.org/W3215921998","doi":"https://doi.org/10.1109/isi53945.2021.9624857","mag":"3215921998"},"language":"en","primary_location":{"id":"doi:10.1109/isi53945.2021.9624857","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi53945.2021.9624857","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106760458","display_name":"Rebecca Jones","orcid":null},"institutions":[{"id":"https://openalex.org/I142606810","display_name":"Pacific Northwest National Laboratory","ror":"https://ror.org/05h992307","country_code":"US","type":"facility","lineage":["https://openalex.org/I1325736334","https://openalex.org/I1330989302","https://openalex.org/I142606810","https://openalex.org/I39565521"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rebecca Jones","raw_affiliation_strings":["Pacific Northwest National Laboratory (PNNL), Richland, WA, USA"],"affiliations":[{"raw_affiliation_string":"Pacific Northwest National Laboratory (PNNL), Richland, WA, USA","institution_ids":["https://openalex.org/I142606810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081585898","display_name":"Daniel C. Fortin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Daniel Fortin","raw_affiliation_strings":["PNNL, Richland, WA, USA"],"affiliations":[{"raw_affiliation_string":"PNNL, Richland, WA, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101963270","display_name":"Samrat Chatterjee","orcid":"https://orcid.org/0000-0003-1406-1093"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Samrat Chatterjee","raw_affiliation_strings":["PNNL, Richland, WA, USA"],"affiliations":[{"raw_affiliation_string":"PNNL, Richland, WA, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091476377","display_name":"Dennis Thomas","orcid":"https://orcid.org/0000-0002-9209-8740"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dennis G. Thomas","raw_affiliation_strings":["PNNL, Richland, WA, USA"],"affiliations":[{"raw_affiliation_string":"PNNL, Richland, WA, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060818726","display_name":"Lisa Newburn","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lisa Newburn","raw_affiliation_strings":["PNNL, Richland, WA, USA"],"affiliations":[{"raw_affiliation_string":"PNNL, Richland, WA, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5106760458"],"corresponding_institution_ids":["https://openalex.org/I142606810"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1776037,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"99","issue":null,"first_page":"1","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/centrality","display_name":"Centrality","score":0.7821146249771118},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.774932861328125},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6314606666564941},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.591543972492218},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4993553161621094},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4984722137451172},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.44496703147888184},{"id":"https://openalex.org/keywords/online-community","display_name":"Online community","score":0.42878738045692444},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4210098385810852},{"id":"https://openalex.org/keywords/social-network-analysis","display_name":"Social network analysis","score":0.41124480962753296},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.3802057206630707},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3465989828109741}],"concepts":[{"id":"https://openalex.org/C53811970","wikidata":"https://www.wikidata.org/wiki/Q5062194","display_name":"Centrality","level":2,"score":0.7821146249771118},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.774932861328125},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6314606666564941},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.591543972492218},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4993553161621094},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4984722137451172},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.44496703147888184},{"id":"https://openalex.org/C2778165684","wikidata":"https://www.wikidata.org/wiki/Q6576792","display_name":"Online community","level":2,"score":0.42878738045692444},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4210098385810852},{"id":"https://openalex.org/C114713312","wikidata":"https://www.wikidata.org/wiki/Q7551269","display_name":"Social network analysis","level":3,"score":0.41124480962753296},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.3802057206630707},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3465989828109741},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi53945.2021.9624857","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi53945.2021.9624857","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.41999998688697815,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2021969955","https://openalex.org/W2507430512","https://openalex.org/W2924947948","https://openalex.org/W3012878901","https://openalex.org/W3101290021","https://openalex.org/W6760756325"],"related_works":["https://openalex.org/W2775281403","https://openalex.org/W2111828149","https://openalex.org/W2525684585","https://openalex.org/W1663961612","https://openalex.org/W4386562244","https://openalex.org/W2126991419","https://openalex.org/W2611574733","https://openalex.org/W2017965876","https://openalex.org/W4247946391","https://openalex.org/W2185295010"],"abstract_inverted_index":{"Understanding":[0],"and":[1,11,30,62,80,101,120,139,156],"early":[2,21,129],"awareness":[3],"of":[4,23,32,59,77,82,103,114,134,159],"software":[5,24,135],"vulnerabilities":[6,25],"is":[7],"vital":[8],"for":[9,127],"preventing":[10],"mitigating":[12],"potential":[13,112],"impacts":[14],"from":[15,43,116],"cybersecurity":[16],"events.":[17],"One":[18],"step":[19],"toward":[20],"characterization":[22],"may":[26],"involve":[27],"analyzing":[28],"discussion":[29],"spread":[31],"information":[33,42,63],"in":[34,123,143,172],"online":[35,48,144],"social":[36,90],"networks.":[37,174],"Prior":[38],"work":[39],"has":[40],"used":[41],"such":[44],"discussions":[45],"over":[46,87,165],"multiple":[47],"forums":[49,145],"to":[50],"develop":[51],"dynamic":[52,173],"networks":[53],"among":[54],"users":[55,86,92,113],"followed":[56],"by":[57,72,85],"analysis":[58],"structure,":[60],"spread,":[61],"evolution.":[64],"In":[65,89],"this":[66],"work,":[67],"we":[68,167],"advance":[69],"the":[70,104,117,132],"state-of-the-art":[71],"focusing":[73],"on":[74,94,98],"data-driven":[75],"learning":[76],"types,":[78],"roles,":[79],"transition":[81],"roles":[83,96,108,141],"exhibited":[84],"time.":[88],"networks,":[91],"take":[93],"particular":[95],"based":[97],"their":[99],"actions":[100],"structure":[102],"network.":[105],"Identifying":[106],"\u201cmeaningful\u201d":[107],"can":[109],"help":[110],"separate":[111],"interest":[115],"larger":[118],"community,":[119],"identify":[121,138],"patterns":[122],"a":[124],"network":[125],"relevant":[126],"generating":[128],"insights":[130],"into":[131],"extent":[133],"vulnerabilities.":[136],"We":[137],"compare":[140],"found":[142],"(e.g.,":[146],"Twitter)":[147],"using":[148],"feature-based":[149],"Non-negative":[150],"Matrix":[151],"Factorization":[152],"coupled":[153],"with":[154],"topological":[155],"influence-based":[157],"measures":[158],"centrality.":[160],"Since":[161],"users\u2019":[162],"activities":[163],"change":[164],"time,":[166],"also":[168],"analyze":[169],"role":[170],"evolution":[171]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
