NLPExplorer
Papers
Venues
Authors
Authors Timeline
Field of Study
URLs
ACL N-gram Stats
TweeNLP
API
Team
Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media
Shi Zong
|
Alan Ritter
|
Graham Mueller
|
Evan Wright
|
Paper Details:
Month: June
Year: 2019
Location: Minneapolis, Minnesota
Venue:
NAACL |
Citations
URL
No Citations Yet
https://github.com/viczong/
https://nvd.nist.gov/
https://www.cvedetails.com/browse-by-date.php
https://www.recordedfuture.com/vulnerability-disclosure-delay/
https://github.com/aritter/twitter
http://kb1.cse.ohio-state.edu:8123/
https://t.co/TWx7jSi1gc
https://t.co/4idb570d1E
https://t.co/LLlPATy9vR
https://nvd.nist.gov/vuln-metrics/cvss
https://www.first.org/cvss/cvss-based-patch-policy.pdf
https://www.first.org/cvss/user-guide
http://thenextweb.com/insider/2016/01/20/newly-discovered-
http://ift.tt/1OvB4JA
http://goo.gl/r95ZYZ
http://ow.ly/gR3l30dJXlj
http://s.cgvpn.net/Zu
http://ift.tt/2va8Wrx
http://tinyurl.com/zjdp268
http://ift.tt/2es31Xc
http://www.bbc.co.uk/news/technology-37728010?ocid=socialflow
http://arstechnica.com/security/2016/10/most-serious-linux-privilege-escalation-
https://www.grahamcluley.com/patch-flash/
http://bit.ly/2eaTxhO
https://helpx.adobe.com/security/products/flash-
https://www.symantec.com/security-center/a-z
https://www.symantec.com/security
https://www.exploit-db.com/
http://cve.mitre.org/data/refs/refmap/source-EXPLOIT-DB.html
https://www.riskbasedsecurity.com/2017/05/
http://ift.tt/2rWXQXa
http://owl.li/Xw3VO
http://bit.ly/1JqGtD9
https://nvd.nist.gov/vuln/detail/CVE-2016-2123
https://twitter.com/ryf
Field Of Study
Linguistic Trends
Embeddings
Task
Tagging
Named Entity Recognition
Sentiment Analysis
Event Detection
Approach
Graphical Model
Language
English
Dataset
News
Social Media
Twitter