{"id":"https://openalex.org/W2270414365","doi":"https://doi.org/10.1145/2736277.2741083","title":"Weakly Supervised Extraction of Computer Security Events from Twitter","display_name":"Weakly Supervised Extraction of Computer Security Events from Twitter","publication_year":2015,"publication_date":"2015-05-18","ids":{"openalex":"https://openalex.org/W2270414365","doi":"https://doi.org/10.1145/2736277.2741083","mag":"2270414365"},"language":"en","primary_location":{"id":"doi:10.1145/2736277.2741083","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2736277.2741083","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th International Conference on World Wide Web","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039096905","display_name":"Alan Ritter","orcid":null},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Alan Ritter","raw_affiliation_strings":["Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058575798","display_name":"Evan Wright","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Evan Wright","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh, PA, USA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063254632","display_name":"William Casey","orcid":"https://orcid.org/0000-0001-7718-7385"},"institutions":[{"id":"https://openalex.org/I114772536","display_name":"Software Engineering Institute","ror":"https://ror.org/01xqjjn94","country_code":"US","type":"facility","lineage":["https://openalex.org/I114772536","https://openalex.org/I74973139"]},{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"William Casey","raw_affiliation_strings":["Software Engineering Institute Carnegie Mellon University, Pittsburgh, PA, USA"],"affiliations":[{"raw_affiliation_string":"Software Engineering Institute Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I114772536","https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102921433","display_name":"Tom M. Mitchell","orcid":"https://orcid.org/0000-0001-7373-0301"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tom Mitchell","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh, PA, USA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5039096905"],"corresponding_institution_ids":["https://openalex.org/I52357470"],"apc_list":null,"apc_paid":null,"fwci":18.5685,"has_fulltext":false,"cited_by_count":135,"citation_normalized_percentile":{"value":0.9930976,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"896","last_page":"905"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8376115560531616},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.6108251214027405},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5275459289550781},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.497088223695755},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.4919140338897705},{"id":"https://openalex.org/keywords/labeled-data","display_name":"Labeled data","score":0.47720012068748474},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43387627601623535},{"id":"https://openalex.org/keywords/supervised-learning","display_name":"Supervised learning","score":0.4195706248283386},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.41385602951049805},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3359871506690979},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3359518349170685},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18230363726615906},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.1037522554397583}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8376115560531616},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.6108251214027405},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5275459289550781},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.497088223695755},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.4919140338897705},{"id":"https://openalex.org/C2776145971","wikidata":"https://www.wikidata.org/wiki/Q30673951","display_name":"Labeled data","level":2,"score":0.47720012068748474},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43387627601623535},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.4195706248283386},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.41385602951049805},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3359871506690979},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3359518349170685},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18230363726615906},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.1037522554397583},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2736277.2741083","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2736277.2741083","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th International Conference on World Wide Web","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.695.6790","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.695.6790","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.www2015.it/documents/proceedings/proceedings/p896.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W22461475","https://openalex.org/W40890042","https://openalex.org/W1479807131","https://openalex.org/W1489949474","https://openalex.org/W1512387364","https://openalex.org/W1554540371","https://openalex.org/W1787402258","https://openalex.org/W1976339648","https://openalex.org/W1977931290","https://openalex.org/W2018992824","https://openalex.org/W2046240631","https://openalex.org/W2068737686","https://openalex.org/W2068882115","https://openalex.org/W2086553822","https://openalex.org/W2093812930","https://openalex.org/W2103931177","https://openalex.org/W2104411075","https://openalex.org/W2107598941","https://openalex.org/W2118697335","https://openalex.org/W2119759918","https://openalex.org/W2122052811","https://openalex.org/W2123661878","https://openalex.org/W2123958887","https://openalex.org/W2124499489","https://openalex.org/W2132870739","https://openalex.org/W2133227149","https://openalex.org/W2137023796","https://openalex.org/W2140355323","https://openalex.org/W2140427797","https://openalex.org/W2141150033","https://openalex.org/W2141416357","https://openalex.org/W2146007434","https://openalex.org/W2152336115","https://openalex.org/W2153848201","https://openalex.org/W2154368244","https://openalex.org/W2159981908","https://openalex.org/W2160642151","https://openalex.org/W2162179097","https://openalex.org/W2165516035","https://openalex.org/W2169200297","https://openalex.org/W2250265269","https://openalex.org/W2250392808","https://openalex.org/W2251775380","https://openalex.org/W2261508469","https://openalex.org/W2476805966","https://openalex.org/W2479174951","https://openalex.org/W2486125749","https://openalex.org/W2604561121","https://openalex.org/W3010865323"],"related_works":["https://openalex.org/W3170999895","https://openalex.org/W4389374014","https://openalex.org/W34092691","https://openalex.org/W4287117940","https://openalex.org/W2131513867","https://openalex.org/W4389989304","https://openalex.org/W2036486025","https://openalex.org/W4312414840","https://openalex.org/W2952937263","https://openalex.org/W1614742790"],"abstract_inverted_index":{"Twitter":[0],"contains":[1],"a":[2,29,45,52,91,111,123,149,158],"wealth":[3],"of":[4,11,55,84,101,114,212],"timely":[5],"information,":[6],"however":[7],"staying":[8],"on":[9,174,201],"top":[10],"breaking":[12,200],"events":[13,102,199,214],"requires":[14],"that":[15],"an":[16,38,61,71],"information":[17,25],"analyst":[18,72],"constantly":[19],"scan":[20],"many":[21,67],"sources,":[22],"leading":[23],"to":[24,33,75,80,105],"overload.":[26],"For":[27],"example,":[28],"user":[30],"might":[31,59],"wish":[32,74],"be":[34],"made":[35],"aware":[36],"whenever":[37],"infectious":[39],"disease":[40],"outbreak":[41],"takes":[42],"place,":[43],"when":[44,51],"new":[46,99],"smartphone":[47],"is":[48,132,142,219],"announced":[49],"or":[50],"distributed":[53],"Denial":[54],"Service":[56],"(DoS)":[57],"attack":[58],"affect":[60],"organization's":[62],"network":[63],"connectivity.":[64],"There":[65],"are":[66,103,139,180],"possible":[68],"event":[69,120],"categories":[70,100],"may":[73],"track,":[76],"making":[77],"it":[78],"impossible":[79],"anticipate":[81],"all":[82],"those":[83],"interest":[85],"in":[86,95,144,168,172],"advance.":[87],"We":[88,117,195],"therefore":[89],"propose":[90,148],"weakly":[92],"supervised":[93],"approach,":[94],"which":[96,152],"extractors":[97],"for":[98],"easy":[104],"define":[106],"and":[107,129,186,191,207],"train,":[108],"by":[109,216],"specifying":[110],"small":[112],"number":[113],"seed":[115],"examples.":[116],"cast":[118],"seed-based":[119],"extraction":[121],"as":[122,141],"learning":[124,150],"problem":[125],"where":[126],"only":[127],"positive":[128],"unlabeled":[130,137],"data":[131,205],"available.":[133],"Rather":[134],"than":[135],"assuming":[136],"instances":[138],"negative,":[140],"common":[143],"previous":[145,170],"work,":[146,171],"we":[147],"objective":[151],"regularizes":[153],"the":[154],"label":[155],"distribution":[156],"towards":[157],"user-provided":[159],"expectation.":[160],"Our":[161],"approach":[162],"greatly":[163],"outperforms":[164],"heuristic":[165],"negatives,":[166],"used":[167],"most":[169],"experiments":[173],"real-world":[175],"data.":[176],"Significant":[177],"performance":[178],"gains":[179],"also":[181],"demonstrated":[182],"over":[183],"two":[184],"novel":[185],"competitive":[187],"baselines:":[188],"semi-supervised":[189],"EM":[190],"one-class":[192],"support-vector":[193],"machines.":[194],"investigate":[196],"three":[197],"security-related":[198],"Twitter:":[202],"DoS":[203],"attacks,":[204],"breaches":[206],"account":[208],"hijacking.":[209],"A":[210],"demonstration":[211],"security":[213],"extracted":[215],"our":[217],"system":[218],"available":[220],"at:":[221],"http://kb1.cse.ohio-state.edu:8123/events/hacked":[222]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":16},{"year":2020,"cited_by_count":20},{"year":2019,"cited_by_count":22},{"year":2018,"cited_by_count":18},{"year":2017,"cited_by_count":20},{"year":2016,"cited_by_count":10},{"year":2015,"cited_by_count":5}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
