2020
DOI: 10.3390/app10175922
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM

Abstract: In the context of increasing cyber threats and attacks, monitoring and analyzing network security incidents in a timely and effective way is the key to ensuring network infrastructure security. As one of the world’s most popular social media sites, users post all kinds of messages on Twitter, from daily life to global news and political strategy. It can aggregate a large number of network security-related events promptly and provide a source of information flow about cyber threats. In this paper, for detecting… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…This paper stacks four convolutional blocks of the same size, with a convolutional kernel count of 128. In order to better filter useful text, a layer of gating units is added at the end of each convolutional block, allowing the model to assign larger weights to more useful features [12] .…”
Section: Iterated Dilated Convolutional Neural Network (Idcnn)mentioning
confidence: 99%
“…This paper stacks four convolutional blocks of the same size, with a convolutional kernel count of 128. In order to better filter useful text, a layer of gating units is added at the end of each convolutional block, allowing the model to assign larger weights to more useful features [12] .…”
Section: Iterated Dilated Convolutional Neural Network (Idcnn)mentioning
confidence: 99%
“…Although the most widely used convolution neural network (CNN) (Aslan et al, 2021) has obvious computational advantages in the named entity recognition of MNP documents, the traditional CNN can only obtain a small part of the input text information after convolution. In order to obtain contextual information, more convolutional layers need to be added, resulting in deeper networks, more parameters, and being prone to overfitting (Fang et al, 2020). Inflated convolutional neural network (IDCNN) (Li et al, 2022b) adds convolution holes to CNN, which enables IDCNN to control its sliding window to omit inputs of a specific length range, which can reduce the number of convolutional layers to better capture sentence context information and greatly improve the efficiency of parallel computing (Wang and Xu, 2017).…”
Section: Related Workmentioning
confidence: 99%
“…Social network analysis is performed to explore such intriguing knowledge. In the physical world, social network analysis is utilized in job searching [4], studying urban life psychology, investigation of guilt association [12], finding communities [40], spreading of news [41], and influential networks [18,42]. In the recent era of information and technologies, massive logs are generating for each person, e.g., call records, bank transactions, online purchase records, daily emails, CCTV cameras, and much more mediums [7,43,44].…”
Section: Scientific Programmingmentioning
confidence: 99%