{"id":"https://openalex.org/W2953552194","doi":"https://doi.org/10.4018/ijisp.201907010103","title":"Extracting and Summarizing the Commonly Faced Security Issues from Community Question Answering Site","display_name":"Extracting and Summarizing the Commonly Faced Security Issues from Community Question Answering Site","publication_year":2019,"publication_date":"2019-06-26","ids":{"openalex":"https://openalex.org/W2953552194","doi":"https://doi.org/10.4018/ijisp.201907010103","mag":"2953552194"},"language":"en","primary_location":{"id":"doi:10.4018/ijisp.201907010103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijisp.201907010103","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073701796","display_name":"Abhishek Kumar Singh","orcid":"https://orcid.org/0000-0002-2504-7820"},"institutions":[{"id":"https://openalex.org/I38335241","display_name":"National Institute of Technology Raipur","ror":"https://ror.org/02y553197","country_code":"IN","type":"education","lineage":["https://openalex.org/I38335241"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Abhishek Kumar Singh","raw_affiliation_strings":["NIT Raipur, Raipur, India"],"affiliations":[{"raw_affiliation_string":"NIT Raipur, Raipur, India","institution_ids":["https://openalex.org/I38335241"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007549080","display_name":"Naresh Kumar Nagwani","orcid":"https://orcid.org/0000-0001-5306-5818"},"institutions":[{"id":"https://openalex.org/I38335241","display_name":"National Institute of Technology Raipur","ror":"https://ror.org/02y553197","country_code":"IN","type":"education","lineage":["https://openalex.org/I38335241"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Naresh Kumar Nagwani","raw_affiliation_strings":["National Institute of Technology Raipur, Raipur, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Raipur, Raipur, India","institution_ids":["https://openalex.org/I38335241"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035540464","display_name":"Sudhakar Pandey","orcid":"https://orcid.org/0000-0002-7626-9335"},"institutions":[{"id":"https://openalex.org/I38335241","display_name":"National Institute of Technology Raipur","ror":"https://ror.org/02y553197","country_code":"IN","type":"education","lineage":["https://openalex.org/I38335241"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sudhakar Pandey","raw_affiliation_strings":["National Institute of Technology Raipur, Raipur, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Raipur, Raipur, India","institution_ids":["https://openalex.org/I38335241"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5073701796"],"corresponding_institution_ids":["https://openalex.org/I38335241"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06092935,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"3","first_page":"48","last_page":"59"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13083","display_name":"Advanced Text Analysis Techniques","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13083","display_name":"Advanced Text Analysis Techniques","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8542532920837402},{"id":"https://openalex.org/keywords/automatic-summarization","display_name":"Automatic summarization","score":0.7833056449890137},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.6514078974723816},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6208977699279785},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.561185896396637},{"id":"https://openalex.org/keywords/spectral-clustering","display_name":"Spectral clustering","score":0.4719245433807373},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.42020130157470703},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.41251885890960693},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38179856538772583},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16305553913116455},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1476374864578247},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13864776492118835}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8542532920837402},{"id":"https://openalex.org/C170858558","wikidata":"https://www.wikidata.org/wiki/Q1394144","display_name":"Automatic summarization","level":2,"score":0.7833056449890137},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.6514078974723816},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6208977699279785},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.561185896396637},{"id":"https://openalex.org/C105611402","wikidata":"https://www.wikidata.org/wiki/Q2976589","display_name":"Spectral clustering","level":3,"score":0.4719245433807373},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.42020130157470703},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.41251885890960693},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38179856538772583},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16305553913116455},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1476374864578247},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13864776492118835},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijisp.201907010103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijisp.201907010103","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jisp00:v:13:y:2019:i:3:p:48-59","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.201907010103","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W593965221","https://openalex.org/W1500903683","https://openalex.org/W1654763638","https://openalex.org/W1993137812","https://openalex.org/W1995662310","https://openalex.org/W2010659179","https://openalex.org/W2051638434","https://openalex.org/W2126895787","https://openalex.org/W2300902812","https://openalex.org/W2332075118","https://openalex.org/W2345128635","https://openalex.org/W2410437504","https://openalex.org/W2507992605","https://openalex.org/W2511548333","https://openalex.org/W2547513165","https://openalex.org/W2553440677","https://openalex.org/W2560654344","https://openalex.org/W2564701447","https://openalex.org/W2565628585","https://openalex.org/W2588281115","https://openalex.org/W2604195377","https://openalex.org/W2612560898","https://openalex.org/W2735085335","https://openalex.org/W2744850448","https://openalex.org/W2767888789","https://openalex.org/W2964214140","https://openalex.org/W2972367661","https://openalex.org/W3100144903","https://openalex.org/W3203311169"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2366403280","https://openalex.org/W1495108544","https://openalex.org/W2091301346","https://openalex.org/W2518037665","https://openalex.org/W3148229873","https://openalex.org/W2150160875","https://openalex.org/W4242223894","https://openalex.org/W1517524280","https://openalex.org/W1482912984"],"abstract_inverted_index":{"Community":[0],"question-answering":[1],"(CQA)":[2],"sites":[3,29,32],"are":[4,17,67,88,113,128],"popular":[5,43],"as":[6],"information-seeking":[7],"platforms":[8],"where":[9],"users":[10],"communicate":[11],"to":[12,41],"their":[13],"peers.":[14],"Security-related":[15],"posts":[16,37,48,112],"gaining":[18],"popularity":[19],"with":[20,97,115,138],"the":[21,82,98,107,123,139],"rapid":[22],"development":[23],"of":[24,36,100,117,141],"information":[25],"technology":[26],"in":[27,78,122],"these":[28],"and.":[30],"CQA":[31],"contains":[33],"wide":[34],"range":[35],"from":[38,130],"classic":[39],"cryptography":[40],"recently":[42],"mobile":[44],"security.":[45],"Investigating":[46],"such":[47],"can":[49],"be":[50],"useful":[51],"for":[52,69,133],"researchers,":[53],"teachers":[54],"and":[55,62,90,144],"developers.":[56],"In":[57,81,106],"this":[58],"article,":[59],"spectral":[60,118],"clustering":[61,119],"frequent":[63,126,142],"term-based":[64],"summarization":[65,137],"techniques":[66],"proposed":[68,74],"security":[70,85,91,103,110,134],"related":[71,86,111,135],"posts.":[72],"The":[73],"method":[75],"is":[76,95],"developed":[77],"three":[79],"stages.":[80],"first":[83],"stage,":[84,109,125],"folksonomies":[87],"created":[89],"post":[92,104,136],"profile":[93],"matrix":[94],"built":[96],"help":[99,116,140],"tag":[101],"frequency-inverse":[102],"frequency.":[105],"second":[108],"grouped":[114],"algorithms.":[120],"Finally,":[121],"third":[124],"terms":[127],"extracted":[129],"each":[131],"cluster":[132],"words":[143],"semantic":[145],"similarity.":[146]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
