UMBC at SemEval-2018 Task 8: Understanding Text about Malware
dc.contributor.author | Padia, Ankur | |
dc.contributor.author | Roy, Arpita | |
dc.contributor.author | Satyapanich, Taneeya W. | |
dc.contributor.author | Ferraro, Francis | |
dc.contributor.author | Pan, Shimei | |
dc.contributor.author | Park, Youngja | |
dc.contributor.author | Joshi, Anupam | |
dc.contributor.author | Finin, Tim | |
dc.date.accessioned | 2018-10-23T13:26:38Z | |
dc.date.available | 2018-10-23T13:26:38Z | |
dc.date.issued | 2018-06-05 | |
dc.description | Proceedings of International Workshop on Semantic Evaluation (SemEval-2018) | en_US |
dc.description.abstract | We describe the systems developed by the UMBC team for 2018 SemEval Task 8, SecureNLP (Semantic Extraction from CybersecUrity REports using Natural Language Processing). We participated in three of the sub-tasks: (1) classifying sentences as being relevant or irrelevant to malware, (2) predicting token labels for sentences, and (4) predicting attribute labels from the Malware Attribute Enumeration and Characterization vocabulary for defining malware characteristics. We achieved F1 scores of 50.34/18.0 (dev/test), 22.23 (test-data), and 31.98 (test-data) for Task1, Task2 and Task2 respectively. We also make our cybersecurity embeddings publicly available at https://bit.ly/cybr2vec. | en_US |
dc.description.sponsorship | The research described in this paper was partially supported by gifts from IBM and Northrop Grumman. We thank Agniva Banerjee, Sudip Mittal, Sandeep Narayanan, Maithilee Prabodh, Vishal Rathod, and Arya Renjan for helping with annotations. | en_US |
dc.description.uri | https://www.aclweb.org/anthology/S18-1142/ | en_US |
dc.format.extent | 7 pages | en_US |
dc.genre | conference papers and proceedings | en_US |
dc.identifier | doi:10.13016/M2WS8HQ5Q | |
dc.identifier.uri | http://hdl.handle.net/11603/11641 | |
dc.identifier.uri | 10.18653/v1/S18-1142 | |
dc.language.iso | en_US | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Information Systems Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.relation.ispartof | UMBC Student Collection | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.rights | Attribution 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
dc.subject | cybersecurity | en_US |
dc.subject | information extraction | en_US |
dc.subject | natural language processing | en_US |
dc.subject | UMBC Ebiquity Research Group | en_US |
dc.title | UMBC at SemEval-2018 Task 8: Understanding Text about Malware | en_US |
dc.type | Text | en_US |