M. A. Al-garadi, K. D. Varathan, and S. D. Ravana, Cybercrime detection in online communications: The experimental case of cyberbullying detection in the twitter network, Computers in Human Behavior, vol.63, pp.433-443, 2016.

W. A. Arbaugh, W. L. Fithen, and J. Mchugh, Windows of vulnerability: A case study analysis, Computer, vol.33, issue.12, pp.52-59, 2000.

F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, Detecting spammers on twitter, Collaboration, electronic messaging, anti-abuse and spam conference, vol.6, p.0, 2010.

L. Bilge and T. Dumitras, Before we knew it: an empirical study of zero-day attacks in the real world, Proceedings of the 2012 ACM conference on Computer and communications security, pp.833-844, 2012.

J. Bollen and H. Mao, Twitter mood as a stock market predictor, Computer, vol.44, issue.10, pp.91-94, 2011.

Y. Cao, Z. Qian, Z. Wang, T. Dao, S. V. Krishnamurthy et al., Off-path tcp exploits: Global rate limit considered dangerous, 25th USENIX Security Symposium (USENIX Security 16), pp.210-225, 2016.

C. Chen, Y. Wang, J. Zhang, Y. Xiang, W. Zhou et al., Statistical features-based real-time detection of drifted twitter spam, IEEE Transactions on Information Forensics and Security, vol.12, issue.4, pp.914-925, 2017.

C. Chen, J. Zhang, Y. Xiang, W. Zhou, and J. Oliver, Spammers are becoming "smarter" on twitter. IT Professional, vol.18, pp.66-70, 2016.

,

A. Crooks, A. Croitoru, A. Stefanidis, and J. Radzikowski, #earthquake: Twitter as a distributed sensor system, Transactions in GIS, vol.17, issue.1, pp.124-147, 2012.

B. Cui, S. Moskal, H. Du, and S. J. Yang, Who shall we follow in twitter for cyber vulnerability? In: Social Computing, Behavioral-Cultural Modeling and Prediction, pp.394-402, 2013.

C. A. Davis, O. Varol, E. Ferrara, A. Flammini, and F. Menczer, Botornot: A system to evaluate social bots, Proceedings of the 25th International Conference Companion on World Wide Web, pp.273-274, 2016.

Y. Erkal, M. Sezgin, and S. Gunduz, A new cyber security alert system for twitter, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), 2015.

S. Frei, M. May, U. Fiedler, and B. Plattner, Large-scale vulnerability analysis, Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, 2006.

S. Frei, B. Tellenbach, and B. Plattner, 0-day patch-exposing vendors(in) security performance, BlackHat Europe, 2008.

C. Grier, K. Thomas, V. Paxson, and M. Zhang, @ spam: the underground on 140 characters or less, Proceedings of the 17th ACM conference on Computer and communications security, pp.27-37, 2010.

J. Jang-jaccard and S. Nepal, A survey of emerging threats in cybersecurity, Journal of Computer and System Sciences, vol.80, issue.5, pp.973-993, 2014.

D. Jeske, A. R. Mcneill, L. Coventry, and P. Briggs, Security information sharing via twitter:'heartbleed'as a case study, International Journal of Web Based Communities, vol.13, issue.2, pp.172-192, 2017.

R. P. Khandpur, T. Ji, S. Jan, G. Wang, C. T. Lu et al., Crowdsourcing cybersecurity, Proceedings of the 2017 ACM on Conference on Information and Knowledge Management-CIKM 17, 2017.

,

S. Lee and J. Kim, WarningBird: A near real-time detection system for suspicious URLs in twitter stream, IEEE Transactions on Dependable and Secure Computing, vol.10, issue.3, pp.183-195, 2013.
DOI : 10.1109/tdsc.2013.3

P. Mell and T. Grance, Use of the common vulnerabilities and exposures (CVE) vulnerability naming scheme, 2002.

P. M. Mell, T. Bergeron, and D. Henning, Creating a patch and vulnerability management program, 2005.
DOI : 10.6028/nist.sp.800-40ver2

URL : https://doi.org/10.6028/nist.sp.800-40ver2

S. Mohurle and M. Patil, A brief study of wannacry threat: Ransomware attack 2017, International Journal, vol.8, issue.5, 2017.

N. S. Murugan and G. U. Devi, Detecting streaming of twitter spam using hybrid method. Wireless Personal Communications, 2018.

,

A. Ritter, E. Wright, W. Casey, and T. Mitchell, Weakly supervised extraction of computer security events from twitter, Proceedings of the 24th International Conference on World Wide Web-WWW 15, 2015.
DOI : 10.1145/2736277.2741083

URL : http://www.www2015.it/documents/proceedings/proceedings/p896.pdf

,

C. Sabottke, O. Suciu, and T. Dumitra, Vulnerability disclosure in the age of social media: exploiting twitter for predicting real-world exploits, 24th USENIX Security Symposium (USENIX Security 15), pp.1041-1056, 2015.

C. Sauerwein, C. Sillaber, and R. Breu, Shadow cyber threat intelligence and its use in information security and risk management processes, Multikonferenz Wirtschaftsinformatik (MKWI 2018, 2018.

C. Sauerwein, C. Sillaber, A. Mussmann, and R. Breu, Threat intelligence sharing platforms: An exploratory study of software vendors and research perspectives, Proceedings of the International Conference on Wirtschaftsinformatik 2017, 2017.

Q. L. Sceller, E. B. Karbab, M. Debbabi, and F. Iqbal, SONAR, Proceedings of the 12th International Conference on Availability, Reliability and Security, 2017.

H. Shen and X. Liu, Detecting spammers on twitter based on content and social interaction, 2015 International Conference on Network and Information Systems for Computers, 2015.
DOI : 10.1109/icnisc.2015.82

Z. A. Soomro, M. H. Shah, and J. Ahmed, Information security management needs more holistic approach: A literature review, International Journal of Information Management, vol.36, issue.2, pp.215-225, 2016.
DOI : 10.1016/j.ijinfomgt.2015.11.009

,

G. Stilo, P. Velardi, A. E. Tozzi, and F. Gesualdo, Predicting flu epidemics using twitter and historical data, Brain Informatics and Health, pp.164-177, 2014.
DOI : 10.1007/978-3-319-09891-3_16

P. Suárez-serrato, M. E. Roberts, C. Davis, and F. Menczer, On the influence of social bots in online protests, Lecture Notes in Computer Science, pp.269-278, 2016.

R. Syed, Analyzing software vendors patch release behavior in the age of social media, Proceedings of the International Conference on Information Systems, 2017.

R. Syed, M. Rahafrooz, and J. M. Keisler, What it takes to get retweeted: An analysis of software vulnerability messages, Computers in Human Behavior, vol.80, pp.207-215, 2018.
DOI : 10.1016/j.chb.2017.11.024

S. Trabelsi, H. Plate, A. Abida, M. M. Aoun, A. Zouaoui et al., Mining social networks for software vulnerabilities monitoring, 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015.
DOI : 10.1109/ntms.2015.7266506

A. H. Wang, Don't follow me: Spam detection in twitter, Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on, pp.1-10, 2010.