{"id":"https://openalex.org/W4406753679","doi":"https://doi.org/10.1109/tdsc.2025.3532885","title":"TRACE: Relationship Analysis and Causal Factor Extraction in Cyber Threat Intelligence Reports","display_name":"TRACE: Relationship Analysis and Causal Factor Extraction in Cyber Threat Intelligence Reports","publication_year":2025,"publication_date":"2025-01-23","ids":{"openalex":"https://openalex.org/W4406753679","doi":"https://doi.org/10.1109/tdsc.2025.3532885"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3532885","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3532885","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019351314","display_name":"R. Vaitheeshwari","orcid":null},"institutions":[{"id":"https://openalex.org/I22265921","display_name":"National Central University","ror":"https://ror.org/00944ve71","country_code":"TW","type":"education","lineage":["https://openalex.org/I22265921"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"R. Vaitheeshwari","raw_affiliation_strings":["National Central University, Taoyuan, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Central University, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I22265921"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017527118","display_name":"Eric Hsiao\u2010Kuang Wu","orcid":"https://orcid.org/0000-0002-1767-2773"},"institutions":[{"id":"https://openalex.org/I22265921","display_name":"National Central University","ror":"https://ror.org/00944ve71","country_code":"TW","type":"education","lineage":["https://openalex.org/I22265921"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Eric Hsiao-Kuang Wu","raw_affiliation_strings":["National Central University, Taoyuan, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Central University, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I22265921"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021844836","display_name":"Ying\u2010Dar Lin","orcid":"https://orcid.org/0000-0002-5226-4396"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ying-Dar Lin","raw_affiliation_strings":["National Yang Ming Chiao Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035925200","display_name":"Ren\u2010Hung Hwang","orcid":"https://orcid.org/0000-0001-7996-4184"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ren-Hung Hwang","raw_affiliation_strings":["National Yang Ming Chiao Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084330488","display_name":"Po\u2010Ching Lin","orcid":"https://orcid.org/0000-0001-8294-5857"},"institutions":[{"id":"https://openalex.org/I148099254","display_name":"National Chung Cheng University","ror":"https://ror.org/0028v3876","country_code":"TW","type":"education","lineage":["https://openalex.org/I148099254"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Po-Ching Lin","raw_affiliation_strings":["National Chung Cheng University, Chiayi, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Chung Cheng University, Chiayi, Taiwan","institution_ids":["https://openalex.org/I148099254"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085347760","display_name":"Yuan\u2010Cheng Lai","orcid":"https://orcid.org/0000-0003-3695-5784"},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yuan-Cheng Lai","raw_affiliation_strings":["National Taiwan University of Science and Technology, Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Taiwan University of Science and Technology, Taipei, Taiwan","institution_ids":["https://openalex.org/I154864474"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100740211","display_name":"Asad Ali","orcid":"https://orcid.org/0000-0001-9660-7533"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Asad Ali","raw_affiliation_strings":["National Institute of Cyber Security, Ministry of Digital Affairs, Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Institute of Cyber Security, Ministry of Digital Affairs, Taipei, Taiwan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5019351314"],"corresponding_institution_ids":["https://openalex.org/I22265921"],"apc_list":null,"apc_paid":null,"fwci":22.155,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.99065268,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"22","issue":"4","first_page":"3544","last_page":"3560"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.6721875667572021},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6699601411819458},{"id":"https://openalex.org/keywords/intelligence-analysis","display_name":"Intelligence analysis","score":0.4609907269477844},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.397402286529541},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32205483317375183}],"concepts":[{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.6721875667572021},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6699601411819458},{"id":"https://openalex.org/C517642484","wikidata":"https://www.wikidata.org/wiki/Q2388514","display_name":"Intelligence analysis","level":2,"score":0.4609907269477844},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.397402286529541},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32205483317375183},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3532885","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3532885","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1999489595","https://openalex.org/W2771963642","https://openalex.org/W2837911466","https://openalex.org/W2952357537","https://openalex.org/W2965373594","https://openalex.org/W2974015196","https://openalex.org/W3006161904","https://openalex.org/W3023308726","https://openalex.org/W3083012366","https://openalex.org/W3112944441","https://openalex.org/W3201894803","https://openalex.org/W3207901375","https://openalex.org/W3211888892","https://openalex.org/W3214329506","https://openalex.org/W4206266728","https://openalex.org/W4221069407","https://openalex.org/W4283371414","https://openalex.org/W4286375281","https://openalex.org/W4292452313","https://openalex.org/W4313591697","https://openalex.org/W4366850593","https://openalex.org/W4387298166","https://openalex.org/W4388441710","https://openalex.org/W4390602509","https://openalex.org/W4399039481","https://openalex.org/W4399694351","https://openalex.org/W4404278858","https://openalex.org/W4404515039","https://openalex.org/W6764456104","https://openalex.org/W6766673545","https://openalex.org/W6776615434","https://openalex.org/W6839296902","https://openalex.org/W6852062853","https://openalex.org/W6860386319","https://openalex.org/W6869519367"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Cyber":[0],"Threat":[1],"Intelligence":[2],"(CTI)":[3],"reports":[4,42],"provide":[5],"valuable":[6],"insights":[7,154],"into":[8],"cybersecurity":[9,157],"attack":[10,67,135,145],"techniques,":[11,127],"which":[12],"are":[13],"essential":[14],"for":[15,28],"understanding":[16,65],"threat":[17],"execution.":[18],"Identifying":[19],"the":[20,34,64,106,138,142],"root":[21],"causes":[22],"of":[23,40,66,108,169],"these":[24,71],"techniques":[25,86,136,146],"is":[26],"crucial":[27],"developing":[29],"effective":[30],"defense":[31],"mechanisms.":[32],"However,":[33],"unstructured":[35],"nature":[36],"and":[37,56,63,87,101,124,130,147,178],"inconsistent":[38],"terminology":[39],"CTI":[41,95,162],"pose":[43],"significant":[44],"challenges":[45],"in":[46,174,186],"extracting":[47,175],"causal":[48,81,90,132,176,184],"factors,":[49],"such":[50],"as":[51],"Common":[52],"Weakness":[53],"Enumerations":[54],"(CWEs)":[55],"vulnerable":[57],"data":[58],"components,":[59],"limiting":[60],"proactive":[61],"responses":[62],"interdependencies.":[68],"To":[69],"address":[70,105],"challenges,":[72],"we":[73],"propose":[74],"TRACE,":[75],"a":[76],"novel":[77],"framework":[78],"that":[79],"extracts":[80],"factors":[82,177],"linked":[83],"to":[84,104,155,181],"adversarial":[85],"generates":[88],"comprehensive":[89],"graphs":[91],"revealing":[92],"interdependencies":[93],"within":[94,137],"reports.":[96,139],"TRACE":[97,128,151,164],"combines":[98],"pattern":[99],"extraction":[100],"tagging":[102],"methods":[103],"limitations":[107],"existing":[109],"approaches.":[110],"Utilizing":[111],"Sentence-based":[112],"Bidirectional":[113],"Encoder":[114],"Representations":[115],"from":[116],"Transformers":[117],"(SBERT)":[118],"embeddings":[119],"enhanced":[120],"with":[121],"knowledge":[122],"mappings":[123],"deep":[125],"learning":[126],"discovers":[129],"models":[131],"relationships":[133],"between":[134,144],"By":[140],"bridging":[141],"gap":[143],"their":[148],"underlying":[149],"vulnerabilities,":[150],"provides":[152],"actionable":[153],"enhance":[156],"defenses.":[158],"Evaluated":[159],"on":[160],"710":[161],"reports,":[163],"achieved":[165],"an":[166],"F1":[167],"score":[168],"0.87,":[170],"demonstrating":[171],"its":[172,179],"accuracy":[173],"potential":[180],"advance":[182],"automated":[183],"analysis":[185],"cybersecurity.":[187]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5}],"updated_date":"2026-03-04T09:10:02.777135","created_date":"2025-10-10T00:00:00"}
