Changes
On January 2, 2025 at 11:44:58 PM UTC, admin:
-
Changed value of field
doi_status
toTrue
in Dataset for Using Twitter to Generate Alerts for Cybersecurity Threats and Vulnerabilities -
Changed value of field
doi_date_published
to2025-01-02
in Dataset for Using Twitter to Generate Alerts for Cybersecurity Threats and Vulnerabilities -
Added resource Original Metadata to Dataset for Using Twitter to Generate Alerts for Cybersecurity Threats and Vulnerabilities
f | 1 | { | f | 1 | { |
2 | "access_rights": "", | 2 | "access_rights": "", | ||
3 | "author": "Mittal et al.", | 3 | "author": "Mittal et al.", | ||
4 | "author_email": "", | 4 | "author_email": "", | ||
5 | "citation": [], | 5 | "citation": [], | ||
6 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 6 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
7 | "defined_in": "https://doi.org/10.48550/arXiv.2104.11695", | 7 | "defined_in": "https://doi.org/10.48550/arXiv.2104.11695", | ||
8 | "doi": "10.57702/urgci9wl", | 8 | "doi": "10.57702/urgci9wl", | ||
n | 9 | "doi_date_published": null, | n | 9 | "doi_date_published": "2025-01-02", |
10 | "doi_publisher": "TIB", | 10 | "doi_publisher": "TIB", | ||
n | 11 | "doi_status": false, | n | 11 | "doi_status": true, |
12 | "domain": "https://service.tib.eu/ldmservice", | 12 | "domain": "https://service.tib.eu/ldmservice", | ||
13 | "groups": [ | 13 | "groups": [ | ||
14 | { | 14 | { | ||
15 | "description": "", | 15 | "description": "", | ||
16 | "display_name": "Cyber Security", | 16 | "display_name": "Cyber Security", | ||
17 | "id": "803cb722-b199-4308-a63a-4217626e9aa0", | 17 | "id": "803cb722-b199-4308-a63a-4217626e9aa0", | ||
18 | "image_display_url": "", | 18 | "image_display_url": "", | ||
19 | "name": "cyber-security", | 19 | "name": "cyber-security", | ||
20 | "title": "Cyber Security" | 20 | "title": "Cyber Security" | ||
21 | }, | 21 | }, | ||
22 | { | 22 | { | ||
23 | "description": "", | 23 | "description": "", | ||
24 | "display_name": "Data Mining", | 24 | "display_name": "Data Mining", | ||
25 | "id": "e8dd4632-f54a-466e-a35f-56fec7a43a60", | 25 | "id": "e8dd4632-f54a-466e-a35f-56fec7a43a60", | ||
26 | "image_display_url": "", | 26 | "image_display_url": "", | ||
27 | "name": "data-mining", | 27 | "name": "data-mining", | ||
28 | "title": "Data Mining" | 28 | "title": "Data Mining" | ||
29 | } | 29 | } | ||
30 | ], | 30 | ], | ||
31 | "id": "4529ed7e-dbda-4c85-9aac-1fc925a9e1d0", | 31 | "id": "4529ed7e-dbda-4c85-9aac-1fc925a9e1d0", | ||
32 | "isopen": false, | 32 | "isopen": false, | ||
33 | "landing_page": "", | 33 | "landing_page": "", | ||
34 | "license_title": null, | 34 | "license_title": null, | ||
35 | "link_orkg": "", | 35 | "link_orkg": "", | ||
36 | "metadata_created": "2025-01-02T23:44:56.601383", | 36 | "metadata_created": "2025-01-02T23:44:56.601383", | ||
n | 37 | "metadata_modified": "2025-01-02T23:44:56.601389", | n | 37 | "metadata_modified": "2025-01-02T23:44:57.146700", |
38 | "name": | 38 | "name": | ||
39 | ter-to-generate-alerts-for-cybersecurity-threats-and-vulnerabilities", | 39 | ter-to-generate-alerts-for-cybersecurity-threats-and-vulnerabilities", | ||
40 | "notes": "A dataset for using Twitter to generate alerts for | 40 | "notes": "A dataset for using Twitter to generate alerts for | ||
41 | cybersecurity threats and vulnerabilities.", | 41 | cybersecurity threats and vulnerabilities.", | ||
n | 42 | "num_resources": 0, | n | 42 | "num_resources": 1, |
43 | "num_tags": 6, | 43 | "num_tags": 6, | ||
44 | "organization": { | 44 | "organization": { | ||
45 | "approval_status": "approved", | 45 | "approval_status": "approved", | ||
46 | "created": "2024-11-25T12:11:38.292601", | 46 | "created": "2024-11-25T12:11:38.292601", | ||
47 | "description": "", | 47 | "description": "", | ||
48 | "id": "079d46db-32df-4b48-91f3-0a8bc8f69559", | 48 | "id": "079d46db-32df-4b48-91f3-0a8bc8f69559", | ||
49 | "image_url": "", | 49 | "image_url": "", | ||
50 | "is_organization": true, | 50 | "is_organization": true, | ||
51 | "name": "no-organization", | 51 | "name": "no-organization", | ||
52 | "state": "active", | 52 | "state": "active", | ||
53 | "title": "No Organization", | 53 | "title": "No Organization", | ||
54 | "type": "organization" | 54 | "type": "organization" | ||
55 | }, | 55 | }, | ||
56 | "owner_org": "079d46db-32df-4b48-91f3-0a8bc8f69559", | 56 | "owner_org": "079d46db-32df-4b48-91f3-0a8bc8f69559", | ||
57 | "private": false, | 57 | "private": false, | ||
58 | "relationships_as_object": [], | 58 | "relationships_as_object": [], | ||
59 | "relationships_as_subject": [], | 59 | "relationships_as_subject": [], | ||
t | 60 | "resources": [], | t | 60 | "resources": [ |
61 | { | ||||
62 | "cache_last_updated": null, | ||||
63 | "cache_url": null, | ||||
64 | "created": "2025-01-03T00:16:30", | ||||
65 | "data": [ | ||||
66 | "dcterms:title", | ||||
67 | "dcterms:accessRights", | ||||
68 | "dcterms:creator", | ||||
69 | "dcterms:description", | ||||
70 | "dcterms:issued", | ||||
71 | "dcterms:language", | ||||
72 | "dcterms:identifier", | ||||
73 | "dcat:theme", | ||||
74 | "dcterms:type", | ||||
75 | "dcat:keyword", | ||||
76 | "dcat:landingPage", | ||||
77 | "dcterms:hasVersion", | ||||
78 | "dcterms:format", | ||||
79 | "mls:task", | ||||
80 | "datacite:isDescribedBy" | ||||
81 | ], | ||||
82 | "description": "The json representation of the dataset with its | ||||
83 | distributions based on DCAT.", | ||||
84 | "format": "JSON", | ||||
85 | "hash": "", | ||||
86 | "id": "42237e2d-5b90-4598-95ee-fb61dc29baec", | ||||
87 | "last_modified": "2025-01-02T23:44:57.139402", | ||||
88 | "metadata_modified": "2025-01-02T23:44:57.149634", | ||||
89 | "mimetype": "application/json", | ||||
90 | "mimetype_inner": null, | ||||
91 | "name": "Original Metadata", | ||||
92 | "package_id": "4529ed7e-dbda-4c85-9aac-1fc925a9e1d0", | ||||
93 | "position": 0, | ||||
94 | "resource_type": null, | ||||
95 | "size": 751, | ||||
96 | "state": "active", | ||||
97 | "url": | ||||
98 | resource/42237e2d-5b90-4598-95ee-fb61dc29baec/download/metadata.json", | ||||
99 | "url_type": "upload" | ||||
100 | } | ||||
101 | ], | ||||
61 | "services_used_list": "", | 102 | "services_used_list": "", | ||
62 | "state": "active", | 103 | "state": "active", | ||
63 | "tags": [ | 104 | "tags": [ | ||
64 | { | 105 | { | ||
65 | "display_name": "Cyber Security", | 106 | "display_name": "Cyber Security", | ||
66 | "id": "2a075c1e-98ef-46bb-b773-319367911b2e", | 107 | "id": "2a075c1e-98ef-46bb-b773-319367911b2e", | ||
67 | "name": "Cyber Security", | 108 | "name": "Cyber Security", | ||
68 | "state": "active", | 109 | "state": "active", | ||
69 | "vocabulary_id": null | 110 | "vocabulary_id": null | ||
70 | }, | 111 | }, | ||
71 | { | 112 | { | ||
72 | "display_name": "Cyber Threats", | 113 | "display_name": "Cyber Threats", | ||
73 | "id": "b64aa00c-0718-44e8-b6ab-38532a3869f6", | 114 | "id": "b64aa00c-0718-44e8-b6ab-38532a3869f6", | ||
74 | "name": "Cyber Threats", | 115 | "name": "Cyber Threats", | ||
75 | "state": "active", | 116 | "state": "active", | ||
76 | "vocabulary_id": null | 117 | "vocabulary_id": null | ||
77 | }, | 118 | }, | ||
78 | { | 119 | { | ||
79 | "display_name": "Data Mining", | 120 | "display_name": "Data Mining", | ||
80 | "id": "a725b528-66b5-4151-8131-0106fa7b6633", | 121 | "id": "a725b528-66b5-4151-8131-0106fa7b6633", | ||
81 | "name": "Data Mining", | 122 | "name": "Data Mining", | ||
82 | "state": "active", | 123 | "state": "active", | ||
83 | "vocabulary_id": null | 124 | "vocabulary_id": null | ||
84 | }, | 125 | }, | ||
85 | { | 126 | { | ||
86 | "display_name": "Tweets", | 127 | "display_name": "Tweets", | ||
87 | "id": "81caff1a-c82f-4cc1-91db-df6f5ab4182a", | 128 | "id": "81caff1a-c82f-4cc1-91db-df6f5ab4182a", | ||
88 | "name": "Tweets", | 129 | "name": "Tweets", | ||
89 | "state": "active", | 130 | "state": "active", | ||
90 | "vocabulary_id": null | 131 | "vocabulary_id": null | ||
91 | }, | 132 | }, | ||
92 | { | 133 | { | ||
93 | "display_name": "Twitter", | 134 | "display_name": "Twitter", | ||
94 | "id": "08db1ce0-8141-43dd-b75e-80f3767d7e55", | 135 | "id": "08db1ce0-8141-43dd-b75e-80f3767d7e55", | ||
95 | "name": "Twitter", | 136 | "name": "Twitter", | ||
96 | "state": "active", | 137 | "state": "active", | ||
97 | "vocabulary_id": null | 138 | "vocabulary_id": null | ||
98 | }, | 139 | }, | ||
99 | { | 140 | { | ||
100 | "display_name": "Vulnerabilities", | 141 | "display_name": "Vulnerabilities", | ||
101 | "id": "473bad64-eb80-4f95-8627-a69bbb62c024", | 142 | "id": "473bad64-eb80-4f95-8627-a69bbb62c024", | ||
102 | "name": "Vulnerabilities", | 143 | "name": "Vulnerabilities", | ||
103 | "state": "active", | 144 | "state": "active", | ||
104 | "vocabulary_id": null | 145 | "vocabulary_id": null | ||
105 | } | 146 | } | ||
106 | ], | 147 | ], | ||
107 | "title": "Dataset for Using Twitter to Generate Alerts for | 148 | "title": "Dataset for Using Twitter to Generate Alerts for | ||
108 | Cybersecurity Threats and Vulnerabilities", | 149 | Cybersecurity Threats and Vulnerabilities", | ||
109 | "type": "dataset", | 150 | "type": "dataset", | ||
110 | "version": "" | 151 | "version": "" | ||
111 | } | 152 | } |