{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:50:04Z","timestamp":1725803404208},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/icdm.2019.00110","type":"proceedings-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T06:58:13Z","timestamp":1580453893000},"page":"976-981","source":"Crossref","is-referenced-by-count":7,"title":["VASE: A Twitter-Based Vulnerability Analysis and Score Engine"],"prefix":"10.1109","author":[{"given":"Haipeng","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Noseong","family":"Park","sequence":"additional","affiliation":[]},{"given":"V.S.","family":"Subrahmanian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/937"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1140"},{"article-title":"Spectral networks and locally connected networks on graphs","year":"2013","author":"bruna","key":"ref13"},{"article-title":"Deep convolutional networks on graph-structured data","year":"2015","author":"henaff","key":"ref14"},{"article-title":"Semi-supervised classification with graph convolutional networks","year":"2016","author":"kipf","key":"ref15"},{"key":"ref16","article-title":"Inductive representation learning on large graphs","author":"hamilton","year":"2017","journal-title":"CoRR"},{"article-title":"Graph attention networks","year":"2017","author":"veli?kovi?","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219947"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219890"},{"article-title":"Adam: A method for stochastic optimization","year":"2014","author":"kingma","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330742"},{"key":"ref27","article-title":"Hierarchical multiscale recurrent neural networks","author":"chung","year":"2016","journal-title":"CoRR"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3137571"},{"key":"ref6","first-page":"1041","article-title":"Vulnerability disclosure in the age of social media: Exploiting twitter for predicting real-world exploits","author":"sabottke","year":"2015","journal-title":"Usenix Security"},{"article-title":"Predict which security flaws will be exploited, patch those bugs","year":"2019","author":"rashid","key":"ref5"},{"article-title":"Finding malicious cyber discussions in social media","year":"2016","author":"lippmann","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978315"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3196884"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132866"},{"key":"ref1","article-title":"Security analysts are overworked, understaffed and overwhelmed — here’s how ai can help","author":"khan","year":"2018","journal-title":"Security Intelligence"},{"key":"ref20","article-title":"How powerful are graph neural networks?","author":"xu","year":"2019","journal-title":"ICLRE"},{"journal-title":"Common Vulnerability Scoring System SIG","year":"2019","key":"ref22"},{"article-title":"Attention-based graph neural network for semi-supervised learning","year":"2018","author":"thekumparampil","key":"ref21"},{"journal-title":"Vulnerability Metrics","year":"2019","key":"ref24"},{"journal-title":"Common Vulnerabilities and Exposures","year":"2019","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P15-1033"},{"journal-title":"Elements of Information Theory","year":"2012","author":"cover","key":"ref25"}],"event":{"name":"2019 IEEE International Conference on Data Mining (ICDM)","start":{"date-parts":[[2019,11,8]]},"location":"Beijing, China","end":{"date-parts":[[2019,11,11]]}},"container-title":["2019 IEEE International Conference on Data Mining (ICDM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8961330\/8970627\/08970796.pdf?arnumber=8970796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:19:54Z","timestamp":1658261994000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8970796\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icdm.2019.00110","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}