@InProceedings{CyberTwitter_Using_Twitter_to_generate_alerts_for_Cybersecurity_Threats_and_Vulnerabilities,
author = "Sudip Mittal, Prajit Kumar Das, Varish Mulwad, Anupam Joshi, and Tim Finin",
title = "{CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities}",
month = "August",
year = "2016",
organization = "IEEE",
note = "DOI: <a href="https://doi.org/10.1109/ASONAM.2016.7752338">10.1109/ASONAM.2016.7752338</a>
<br/>
<img src="https://i.imgur.com/w1k3BSY.png" style='height: 90%; width: 90%; object-fit: contain; display: block; margin-left: auto; margin-right: auto;'>",
pages = "860-867",
booktitle = "IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
publisher = "IEEE Computer Society",
}