{"id":"https://openalex.org/W4396851389","doi":"https://doi.org/10.25300/misq/2023/17316","title":"Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach","display_name":"Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach","publication_year":2024,"publication_date":"2024-03-01","ids":{"openalex":"https://openalex.org/W4396851389","doi":"https://doi.org/10.25300/misq/2023/17316"},"language":"en","primary_location":{"id":"doi:10.25300/misq/2023/17316","is_oa":false,"landing_page_url":"https://doi.org/10.25300/misq/2023/17316","pdf_url":null,"source":{"id":"https://openalex.org/S57293258","display_name":"MIS Quarterly","issn_l":"0276-7783","issn":["0276-7783","2162-9730"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4327875293","host_organization_name":"MIS Quarterly","host_organization_lineage":["https://openalex.org/P4327875293"],"host_organization_lineage_names":["MIS Quarterly"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MIS Quarterly","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075447553","display_name":"Benjamin Ampel","orcid":"https://orcid.org/0000-0003-0603-0270"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Benjamin M. Ampel","raw_affiliation_strings":["Department of Management Information Systems, University of Arizona, Tucson, AZ, U.S.A"],"affiliations":[{"raw_affiliation_string":"Department of Management Information Systems, University of Arizona, Tucson, AZ, U.S.A","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038811607","display_name":"Sagar Samtani","orcid":"https://orcid.org/0000-0002-4513-805X"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sagar Samtani","raw_affiliation_strings":["Department of Operations and Decision Technologies, Indiana University, Bloomington, IN, U.S.A"],"affiliations":[{"raw_affiliation_string":"Department of Operations and Decision Technologies, Indiana University, Bloomington, IN, U.S.A","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049960572","display_name":"Hongyi Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I1335518801","display_name":"Texas A&M University \u2013 San Antonio","ror":"https://ror.org/0084njv03","country_code":"US","type":"education","lineage":["https://openalex.org/I1335518801"]},{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hongyi Zhu","raw_affiliation_strings":["Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, U.S.A"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, U.S.A","institution_ids":["https://openalex.org/I45438204","https://openalex.org/I1335518801"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017102020","display_name":"Hsinchun Chen","orcid":"https://orcid.org/0000-0003-3251-2433"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hsinchun Chen","raw_affiliation_strings":["Department of Management Information Systems, University of Arizona, Tucson, AZ, U.S.A"],"affiliations":[{"raw_affiliation_string":"Department of Management Information Systems, University of Arizona, Tucson, AZ, U.S.A","institution_ids":["https://openalex.org/I138006243"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5075447553"],"corresponding_institution_ids":["https://openalex.org/I138006243"],"apc_list":null,"apc_paid":null,"fwci":6.2128,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.97260056,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"48","issue":"1","first_page":"137","last_page":"166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.9278112649917603},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.9102370738983154},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5987278819084167},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5796102285385132},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.5509563684463501},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.45532727241516113},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4025852382183075},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3761056065559387},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32472896575927734}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9278112649917603},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.9102370738983154},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5987278819084167},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5796102285385132},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.5509563684463501},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.45532727241516113},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4025852382183075},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3761056065559387},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32472896575927734}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.25300/misq/2023/17316","is_oa":false,"landing_page_url":"https://doi.org/10.25300/misq/2023/17316","pdf_url":null,"source":{"id":"https://openalex.org/S57293258","display_name":"MIS Quarterly","issn_l":"0276-7783","issn":["0276-7783","2162-9730"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4327875293","host_organization_name":"MIS Quarterly","host_organization_lineage":["https://openalex.org/P4327875293"],"host_organization_lineage_names":["MIS Quarterly"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MIS Quarterly","raw_type":"journal-article"},{"id":"pmh:oai:aisel.aisnet.org:misq-3875","is_oa":false,"landing_page_url":"https://aisel.aisnet.org/misq/vol48/iss1/7","pdf_url":null,"source":{"id":"https://openalex.org/S30879505","display_name":"Journal of the Association for Information Systems","issn_l":"1536-9323","issn":["1536-9323"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310321080","host_organization_name":"Association for Information Systems","host_organization_lineage":["https://openalex.org/P4310321080"],"host_organization_lineage_names":["Association for Information Systems"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Management Information Systems Quarterly","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":62,"referenced_works":["https://openalex.org/W2015136191","https://openalex.org/W2065756680","https://openalex.org/W2141975087","https://openalex.org/W2165698076","https://openalex.org/W2295598076","https://openalex.org/W2559059232","https://openalex.org/W2605284977","https://openalex.org/W2610527038","https://openalex.org/W2729161046","https://openalex.org/W2760313715","https://openalex.org/W2782101021","https://openalex.org/W2783819197","https://openalex.org/W2801115940","https://openalex.org/W2885090444","https://openalex.org/W2887280559","https://openalex.org/W2891503716","https://openalex.org/W2897557170","https://openalex.org/W2907165009","https://openalex.org/W2907473789","https://openalex.org/W2914403931","https://openalex.org/W2914767245","https://openalex.org/W2915002815","https://openalex.org/W2917807496","https://openalex.org/W2927143629","https://openalex.org/W2934842096","https://openalex.org/W2937423263","https://openalex.org/W2945313542","https://openalex.org/W2951603891","https://openalex.org/W2953958347","https://openalex.org/W2962897020","https://openalex.org/W2963917673","https://openalex.org/W2964303116","https://openalex.org/W2964352358","https://openalex.org/W2964522977","https://openalex.org/W2970726176","https://openalex.org/W2996415795","https://openalex.org/W3006161904","https://openalex.org/W3006733680","https://openalex.org/W3007177564","https://openalex.org/W3023144808","https://openalex.org/W3034689516","https://openalex.org/W3041133507","https://openalex.org/W3043801573","https://openalex.org/W3089361635","https://openalex.org/W3100572823","https://openalex.org/W3102783139","https://openalex.org/W3113358185","https://openalex.org/W3121385509","https://openalex.org/W3151685851","https://openalex.org/W3215670829","https://openalex.org/W3215879207","https://openalex.org/W4226418765","https://openalex.org/W4249263087","https://openalex.org/W4413427422","https://openalex.org/W6638667902","https://openalex.org/W6639478124","https://openalex.org/W6675354045","https://openalex.org/W6682132143","https://openalex.org/W6739901393","https://openalex.org/W6748278106","https://openalex.org/W6748546225","https://openalex.org/W6759579507"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W3113358185","https://openalex.org/W2808249021","https://openalex.org/W3040987670","https://openalex.org/W3006507989"],"abstract_inverted_index":{"The":[0],"rapid":[1],"proliferation":[2],"of":[3,14],"complex":[4],"information":[5,86],"systems":[6],"has":[7],"been":[8],"met":[9],"by":[10,42],"an":[11],"ever-increasing":[12],"quantity":[13],"exploits":[15,40,52,113],"that":[16,138],"can":[17],"cause":[18],"irreparable":[19],"cyber":[20,25],"breaches.":[21],"To":[22],"mitigate":[23],"these":[24],"threats,":[26],"academia":[27],"and":[28,38,106,133,151,169],"industry":[29],"have":[30],"placed":[31],"a":[32,84,98,107],"significant":[33],"focus":[34],"on":[35,147],"proactively":[36],"identifying":[37],"labeling":[39,51,70],"developed":[41],"the":[43,77,89,120,139],"international":[44],"hacker":[45,54,115],"community.":[46],"However,":[47],"prevailing":[48],"approaches":[49],"for":[50,161],"in":[53,114,129],"forums":[55],"do":[56],"not":[57],"leverage":[58],"metadata":[59],"from":[60],"exploit":[61,66,93],"darknet":[62],"markets":[63],"or":[64],"public":[65],"repositories":[67],"to":[68,82,110],"enhance":[69],"performance.":[71],"In":[72],"this":[73],"study,":[74],"we":[75],"adopted":[76],"computational":[78],"design":[79],"science":[80],"paradigm":[81],"develop":[83],"novel":[85],"technology":[87],"artifact,":[88],"deep":[90,102,134],"transfer":[91,103],"learning":[92,104,132],"labeler":[94],"(DTL-EL).":[95],"DTL-EL":[96,122,141,155],"incorporates":[97],"pre-initialization":[99],"design,":[100],"multi-layer":[101],"(DTL),":[105],"self-attention":[108],"mechanism":[109],"automatically":[111],"label":[112],"forums.":[116],"We":[117],"rigorously":[118],"evaluated":[119],"proposed":[121,140,154],"against":[123],"state-of-the-art":[124],"non-DTL":[125],"benchmark":[126,144],"methods":[127,145],"based":[128,146],"classical":[130],"machine":[131],"learning.":[135],"Results":[136],"suggest":[137],"significantly":[142],"outperforms":[143],"accuracy,":[148],"precision,":[149],"recall,":[150],"F1-score.":[152],"Our":[153],"framework":[156],"provides":[157],"important":[158],"practical":[159],"implications":[160],"key":[162],"stakeholders":[163],"such":[164],"as":[165],"cybersecurity":[166],"managers,":[167],"analysts,":[168],"educators.":[170]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":9}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
