{"_id":"NwDyMpZ9TdEf9ZGa4","bibbaseid":"arikkat-vinod-a-sorbo-visaggio-conti-cantwitterbeusedtoacquirereliablealertsagainstnovelcyberattacks-2023","author_short":["Arikkat, D. R.","Vinod, P.","A., R. R. K.","Sorbo, A. D.","Visaggio, C. A.","Conti, M."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Dincy","R."],"propositions":[],"lastnames":["Arikkat"],"suffixes":[]},{"firstnames":["P."],"propositions":[],"lastnames":["Vinod"],"suffixes":[]},{"firstnames":["Rafidha","Rehiman","K."],"propositions":[],"lastnames":["A."],"suffixes":[]},{"firstnames":["Andrea","Di"],"propositions":[],"lastnames":["Sorbo"],"suffixes":[]},{"firstnames":["Corrado","Aaron"],"propositions":[],"lastnames":["Visaggio"],"suffixes":[]},{"firstnames":["Mauro"],"propositions":[],"lastnames":["Conti"],"suffixes":[]}],"title":"Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?","journal":"CoRR","volume":"abs/2306.16087","year":"2023","url":"https://doi.org/10.48550/arXiv.2306.16087","doi":"10.48550/ARXIV.2306.16087","eprinttype":"arXiv","eprint":"2306.16087","timestamp":"Fri, 30 Jun 2023 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/corr/abs-2306-16087.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/corr/abs-2306-16087,\n author = {Dincy R. Arikkat and\n P. Vinod and\n Rafidha Rehiman K. A. and\n Andrea Di Sorbo and\n Corrado Aaron Visaggio and\n Mauro Conti},\n title = {Can Twitter be used to Acquire Reliable Alerts against Novel Cyber\n Attacks?},\n journal = {CoRR},\n volume = {abs/2306.16087},\n year = {2023},\n url = {https://doi.org/10.48550/arXiv.2306.16087},\n doi = {10.48550/ARXIV.2306.16087},\n eprinttype = {arXiv},\n eprint = {2306.16087},\n timestamp = {Fri, 30 Jun 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/corr/abs-2306-16087.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Arikkat, D. R.","Vinod, P.","A., R. R. K.","Sorbo, A. D.","Visaggio, C. A.","Conti, M."],"key":"DBLP:journals/corr/abs-2306-16087","id":"DBLP:journals/corr/abs-2306-16087","bibbaseid":"arikkat-vinod-a-sorbo-visaggio-conti-cantwitterbeusedtoacquirereliablealertsagainstnovelcyberattacks-2023","role":"author","urls":{"Paper":"https://doi.org/10.48550/arXiv.2306.16087"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/171/5109.bib","dataSources":["jaREYjGgEyDZbpEPE","tkYZHktxQK36HGz4m","zEQY6Hega8p9e29Ma","iddbzEfGmqi6GhzyH","joZ9xoHDu34eb2XBK"],"keywords":[],"search_terms":["twitter","used","acquire","reliable","alerts","against","novel","cyber","attacks","arikkat","vinod","a.","sorbo","visaggio","conti"],"title":"Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?","year":2023}