{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:42:40Z","timestamp":1730320960407,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,25]],"date-time":"2020-07-25T00:00:00Z","timestamp":1595635200000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-18-1-2670 and N00014-16-1-2896"],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-13-1-0421"],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,25]]},"DOI":"10.1145\/3292500.3330742","type":"proceedings-article","created":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T09:17:26Z","timestamp":1564132646000},"page":"3143-3152","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Using Twitter to Predict When Vulnerabilities will be Exploited"],"prefix":"10.1145","author":[{"given":"Haipeng","family":"Chen","sequence":"first","affiliation":[{"name":"Dartmouth College, Hanover, NH, USA"}]},{"given":"Rui","family":"Liu","sequence":"additional","affiliation":[{"name":"Dartmouth College, Hanover, NH, USA"}]},{"given":"Noseong","family":"Park","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"V.S.","family":"Subrahmanian","sequence":"additional","affiliation":[{"name":"Dartmouth College, Hanover, NH, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International AAAI Conference on Weblogs and Social Media (ICWSM)","volume":"13","author":"Akoglu Leman","year":"2013","unstructured":"Leman Akoglu , Rishi Chandy , and Christos Faloutsos . 2013 . Opinion Fraud Detection in Online Reviews by Network Effects . International AAAI Conference on Weblogs and Social Media (ICWSM) , Vol. 13 (2013), 2--11. Leman Akoglu, Rishi Chandy, and Christos Faloutsos. 2013. Opinion Fraud Detection in Online Reviews by Network Effects. International AAAI Conference on Weblogs and Social Media (ICWSM) , Vol. 13 (2013), 2--11."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CYCONUS.2017.8167501"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835821"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041009"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_1_6_1","unstructured":"The MITRE Corporation. 2018. Common Vulnerabilities and Exposures. (2018). https:\/\/cve.mitre.org\/cve\/. The MITRE Corporation. 2018. Common Vulnerabilities and Exposures. (2018). https:\/\/cve.mitre.org\/cve\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.3.041022"},{"volume-title":"Predicting Cyber Vulnerability Exploits with Machine Learning. In Scandinavian Conference on Artificial Intelligence (SCAI). 48--57","year":"2015","author":"Edkrantz Michel","key":"e_1_3_2_1_8_1","unstructured":"Michel Edkrantz and Alan Said . 2015 . Predicting Cyber Vulnerability Exploits with Machine Learning. In Scandinavian Conference on Artificial Intelligence (SCAI). 48--57 . Michel Edkrantz and Alan Said. 2015. Predicting Cyber Vulnerability Exploits with Machine Learning. In Scandinavian Conference on Artificial Intelligence (SCAI). 48--57."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196884"},{"volume-title":"Ferdinand Georg Frobenius, Ferdinand Georg Frobenius, and Germany Mathematician.","year":"1912","author":"Frobenius Georg","key":"e_1_3_2_1_10_1","unstructured":"Georg Frobenius , Ferdinand Georg Frobenius , Ferdinand Georg Frobenius, Ferdinand Georg Frobenius, and Germany Mathematician. 1912 . \u00dcber Matrizen aus nicht negativen Elementen . (1912). Georg Frobenius, Ferdinand Georg Frobenius, Ferdinand Georg Frobenius, Ferdinand Georg Frobenius, and Germany Mathematician. 1912. \u00dcber Matrizen aus nicht negativen Elementen. (1912)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/58.1.83"},{"key":"e_1_3_2_1_12_1","unstructured":"Zeroday Initialtive. 2018. Rewarding Security Researchers for Privately Disclosing Vulnerabilities. (2018). http:\/\/www.zerodayinitiative.com\/. Zeroday Initialtive. 2018. Rewarding Security Researchers for Privately Disclosing Vulnerabilities. (2018). http:\/\/www.zerodayinitiative.com\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Jerichoattrition. 2016. Open sourced vulnerability database (OSVDB). (2016). https:\/\/blog.osvdb.org\/. Jerichoattrition. 2016. Open sourced vulnerability database (OSVDB). (2016). https:\/\/blog.osvdb.org\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835834"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1093\/comnet\/cnu016"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57529-2_18"},{"volume-title":"International Conference on Machine Learning (ICML). 1188--1196","year":"2014","author":"Le Quoc","key":"e_1_3_2_1_18_1","unstructured":"Quoc Le and Tomas Mikolov . 2014 . Distributed representations of sentences and documents . In International Conference on Machine Learning (ICML). 1188--1196 . Quoc Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In International Conference on Machine Learning (ICML). 1188--1196."},{"volume-title":"https:\/\/nvd.nist.gov\/","year":"2018","author":"Vulnerability Metrics NIST.","key":"e_1_3_2_1_19_1","unstructured":"NIST. 2018. Vulnerability Metrics . ( 2018 ). https:\/\/nvd.nist.gov\/ . NIST. 2018. Vulnerability Metrics. (2018). https:\/\/nvd.nist.gov\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052650"},{"volume-title":"USENIX Security Symposium . 1041--1056","year":"2015","author":"Sabottke Carl","key":"e_1_3_2_1_22_1","unstructured":"Carl Sabottke , Octavian Suciu , and Tudor Dumitras . 2015 . Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits .. In USENIX Security Symposium . 1041--1056 . Carl Sabottke, Octavian Suciu, and Tudor Dumitras. 2015. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits.. In USENIX Security Symposium . 1041--1056."},{"key":"e_1_3_2_1_23_1","unstructured":"Offensive Security. 2018. Offensive Security's Exploit Database Archive. (2018). https:\/\/exploit-db.com\/. Offensive Security. 2018. Offensive Security's Exploit Database Archive. (2018). https:\/\/exploit-db.com\/."},{"key":"e_1_3_2_1_24_1","unstructured":"Symantec. 2018a. Symantec A-Z Listing of Threats & Risks. (2018). https:\/\/www.symantec.com\/security-center\/a-z. Symantec. 2018a. Symantec A-Z Listing of Threats & Risks. (2018). https:\/\/www.symantec.com\/security-center\/a-z."},{"key":"e_1_3_2_1_25_1","unstructured":"Symantec. 2018b. Symantec Attack Signatures. (2018). https:\/\/www.symantec.com\/security_response\/attacksignatures\/. Symantec. 2018b. Symantec Attack Signatures. (2018). https:\/\/www.symantec.com\/security_response\/attacksignatures\/."},{"volume-title":"AAAI Conference on Innovative Applications of Artificial Intelligence (IAAI) .","year":"2018","author":"Tavabi Nazgol","key":"e_1_3_2_1_26_1","unstructured":"Nazgol Tavabi , Palash Goyal , Mohammed Almukaynizi , Paulo Shakarian , and Kristina Lerman . 2018 . Darkembed: Exploit prediction with neural language models . In AAAI Conference on Innovative Applications of Artificial Intelligence (IAAI) . Nazgol Tavabi, Palash Goyal, Mohammed Almukaynizi, Paulo Shakarian, and Kristina Lerman. 2018. Darkembed: Exploit prediction with neural language models. In AAAI Conference on Innovative Applications of Artificial Intelligence (IAAI) ."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783401"}],"event":{"name":"KDD '19: The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Anchorage AK USA","acronym":"KDD '19"},"container-title":["Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330742","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T07:15:44Z","timestamp":1673421344000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330742"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"references-count":26,"alternative-id":["10.1145\/3292500.3330742","10.1145\/3292500"],"URL":"https:\/\/doi.org\/10.1145\/3292500.3330742","relation":{},"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"2019-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}