task
stringclasses 7
values | dataset
stringclasses 34
values | subset
stringclasses 1
value | instruction
stringclasses 7
values | content
stringlengths 1
8.18k
| output
stringlengths 4
3.74k
| schema
stringclasses 79
values | negative_labels
stringclasses 55
values | json
stringlengths 14
6.84k
| system_prompt
stringclasses 7
values |
|---|---|---|---|---|---|---|---|---|---|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
OneLogin has revealed more about the attack on its systems , confirming that a " threat actor " had accessed database tables including " information about users , apps , and various types of keys . "
|
data breach: the attack
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "the attack", "arguments": []}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Now , another vendor going by the handle of CosmicDark is selling a database containing 100,759,591 user accounts stolen from of Youku Inc. , a popular video service in China .
|
data breach: is selling | attacker: CosmicDark | compromised data: a database | compromised data: user accounts | number of data: 100,759,591
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "is selling", "arguments": [{"name": "CosmicDark", "role": "attacker"}, {"name": "a database", "role": "compromised data"}, {"name": "100,759,591", "role": "number of data"}, {"name": "user accounts", "role": "compromised data"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
We had a threat of a hack of a movie being stolen .
|
data breach: a hack
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "a hack", "arguments": []}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
As I wrote earlier this month , the surge of extortion attacks impacting organizations has led to a number of fake extortion threats , including empty ransomware demands where actors contact organizations , lie about the organization ’s data being encrypted , and ask for money to remove the non-existent threat .
|
ransom: empty ransomware demands
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "empty ransomware demands", "arguments": []}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
For their part , LeakBase said since this data breach is n't in the public domain , they will not add the records to their service and it will not be searchable .
|
data breach: this data breach
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "this data breach", "arguments": []}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Similar to the above warning , the fake HMRC email advises that you have to click on a link to complete and submit the refund form .
|
phishing: advises | attack pattern: click on a link to complete and submit the refund form | tool: the fake HMRC email | victim: you
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "phishing", "trigger": "advises", "arguments": [{"name": "the fake HMRC email", "role": "tool"}, {"name": "click on a link to complete and submit the refund form", "role": "attack pattern"}, {"name": "you", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Experts say hackers using Cerber ransomware usually demand $ 1,000 in bitcoin from infected users .
|
ransom: usually demand | attack pattern: using Cerber ransomware | payment method: in bitcoin | price: 1,000 | victim: hackers
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "usually demand", "arguments": [{"name": "1,000", "role": "price"}, {"name": "in bitcoin", "role": "payment method"}, {"name": "using Cerber ransomware", "role": "attack pattern"}, {"name": "hackers", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Once the attackers have their malware loaded onto the point - of - sale devices , they can remotely capture data from each card swiped at that cash register .
|
data breach: can remotely capture | attack pattern: have their malware loaded | attacker: the attackers | attacker: they | compromised data: card | compromised data: data | victim: cash register | victim: the point - of - sale devices
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "can remotely capture", "arguments": [{"name": "cash register", "role": "victim"}, {"name": "card", "role": "compromised data"}, {"name": "data", "role": "compromised data"}, {"name": "they", "role": "attacker"}, {"name": "the point - of - sale devices", "role": "victim"}, {"name": "have their malware loaded", "role": "attack pattern"}, {"name": "the attackers", "role": "attacker"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
“ The bug is exploitable remotely if the remote management option is set and can also be exploited given access to the router over LAN or WLAN , ” he explained .
|
discover vulnerability: be exploited | capabilities: given access to the router over LAN or WLAN | vulnerability: bug
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "discover vulnerability", "trigger": "be exploited", "arguments": [{"name": "bug", "role": "vulnerability"}, {"name": "given access to the router over LAN or WLAN", "role": "capabilities"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
" The alleged list of email addresses and passwords appears to have been obtained from previously compromised third - party services . "
|
data breach: compromised | victim: third - party services
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "compromised", "arguments": [{"name": "third - party services", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Computers across the world were locked up Friday and users ’ files held for ransom when dozens of countries were hit in a cyber-extortion attack that targeted hospitals , companies and government agencies .
|
ransom: were hit
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "were hit", "arguments": []}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
In an email sent to users on 26th December , the site explained that hackers were able to conduct this breach by exploiting a known vulnerability in outdated vBulletin forum software .
|
discover vulnerability: explained | discoverer: the site | time: 26th December
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "discover vulnerability", "trigger": "explained", "arguments": [{"name": "the site", "role": "discoverer"}, {"name": "26th December", "role": "time"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
When done it will display the ransom note to let the victim know that they have been infected .
|
ransom: will display | attack pattern: have been infected | tool: the ransom note | victim: the victim | victim: they
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "will display", "arguments": [{"name": "the ransom note", "role": "tool"}, {"name": "the victim", "role": "victim"}, {"name": "they", "role": "victim"}, {"name": "have been infected", "role": "attack pattern"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
The extortion and the transactions in the ransomware programs themselves have become a profitable business for cybercriminals .
|
ransom: The extortion | attacker: cybercriminals | tool: the ransomware programs
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "The extortion", "arguments": [{"name": "the ransomware programs", "role": "tool"}, {"name": "cybercriminals", "role": "attacker"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
In addition , the group also released a second set of files , which were encrypted with a password the group promised to provide to the winner of online bidding war .
|
data breach: released | attacker: group | compromised data: files | purpose: provide to the winner of online bidding war
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "released", "arguments": [{"name": "group", "role": "attacker"}, {"name": "files", "role": "compromised data"}, {"name": "provide to the winner of online bidding war", "role": "purpose"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
, but still I did n’t leak out the whole contents of the backup files , instead I tweeted out my findings and thought to wait for FBI ’s response " Now let ’s sit and wait for the FBI ’s response .
|
discover vulnerability: tweeted out | discoverer: I | vulnerability: my findings | vulnerable system owner: FBI
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "discover vulnerability", "trigger": "tweeted out", "arguments": [{"name": "FBI", "role": "vulnerable system owner"}, {"name": "I", "role": "discoverer"}, {"name": "my findings", "role": "vulnerability"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
It eventually confirmed a breach in late August that involved cards used from Feb. 16 , 2016 and July 7 , 2016 at nearly all of its restaurants and hotels .
|
data breach: a breach | compromised data: cards | time: from Feb. 16 , 2016 and July 7 , 2016 | time: late August | victim: hotels | victim: its restaurants
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "a breach", "arguments": [{"name": "late August", "role": "time"}, {"name": "cards", "role": "compromised data"}, {"name": "from Feb. 16 , 2016 and July 7 , 2016", "role": "time"}, {"name": "its restaurants", "role": "victim"}, {"name": "hotels", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Unfortunately , however , as is the case with most ransomware attacks , the stakes of losing years worth of important data is always quite high and the ransom demanded usually very small , leading most victims to give in to the attackers ’ demands before even reaching out to law enforcement .
|
ransom: the ransom demanded | victim: victims
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "the ransom demanded", "arguments": [{"name": "victims", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Around that time , the hacking gang , which has also extorted non-film entities in the past , tweeted out that it had stolen content from a number of other media companies .
|
ransom: extorted | attacker: the hacking gang | time: the past
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "extorted", "arguments": [{"name": "the hacking gang", "role": "attacker"}, {"name": "the past", "role": "time"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
The attacks on MongoDB databases have been going on for more than a week and servers from across the globe have been targeted .
|
ransom: The attacks | time: more than a week | victim: MongoDB databases
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "The attacks", "arguments": [{"name": "MongoDB databases", "role": "victim"}, {"name": "more than a week", "role": "time"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Security experts said the recent cyber attack highlighted how sophisticated phishing scams are being used to fool even two of the biggest tech companies .
|
phishing: phishing scams | victim: tech companies
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "phishing", "trigger": "phishing scams", "arguments": [{"name": "tech companies", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
A typical bank would have patched this critical vulnerability within a few days , ” said Pravin Kothari , CEO of CipherCloud , a cloud security company .
|
patch vulnerability: have patched | releaser: A typical bank | time: a few days | vulnerability: this critical vulnerability
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "patch vulnerability", "trigger": "have patched", "arguments": [{"name": "A typical bank", "role": "releaser"}, {"name": "this critical vulnerability", "role": "vulnerability"}, {"name": "a few days", "role": "time"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
W - 2 scams start with spear phishing emails usually directed at finance and HR personnel .
|
phishing: W - 2 scams | tool: spear phishing emails | victim: HR personnel | victim: finance
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "phishing", "trigger": "W - 2 scams", "arguments": [{"name": "finance", "role": "victim"}, {"name": "spear phishing emails", "role": "tool"}, {"name": "HR personnel", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Hence , through compromising this particular cord , a hacker can extract all sorts of data from your mobile including pictures , emails , contact numbers , SMS messages , etc. , without your knowledge obviously .
|
data breach: can extract | attacker: a hacker | compromised data: SMS messages | compromised data: contact numbers | compromised data: emails | compromised data: pictures | compromised data: sorts of data | victim: your mobile
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "can extract", "arguments": [{"name": "a hacker", "role": "attacker"}, {"name": "sorts of data", "role": "compromised data"}, {"name": "your mobile", "role": "victim"}, {"name": "pictures", "role": "compromised data"}, {"name": "emails", "role": "compromised data"}, {"name": "contact numbers", "role": "compromised data"}, {"name": "SMS messages", "role": "compromised data"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Taking into account the copycat nature of the malware scene , this new trick of collecting driver 's license information will most likely spread to other PoS malware families .
|
data breach: collecting | compromised data: driver #$%#s license information | tool: PoS malware families
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "collecting", "arguments": [{"name": "driver #$%#s license information", "role": "compromised data"}, {"name": "PoS malware families", "role": "tool"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
He then sent emails to employees of the two unnamed victim companies , described as multinational internet firms , asking them to wire money that they actually owed to the Asian company to the sham Latvian company ’s accounts , prosecutors said .
|
phishing: sent | attacker: He | tool: emails | victim: employees | victim: the two unnamed victim companies
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "phishing", "trigger": "sent", "arguments": [{"name": "He", "role": "attacker"}, {"name": "emails", "role": "tool"}, {"name": "the two unnamed victim companies", "role": "victim"}, {"name": "employees", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
According to Barracuda Networks , aviation - themed phishing attacks contain links to spoofed airline sites , threat actors personalize the phishing page in a way to trick victims into providing business information .
|
phishing: spoofed | tool: links | trusted entity: airline sites
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "phishing", "trigger": "spoofed", "arguments": [{"name": "airline sites", "role": "trusted entity"}, {"name": "links", "role": "tool"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
The men used simple spear - phishing emails sent to the high - ranking officials they wanted to infect .
|
phishing: sent | attack pattern: used simple spear - phishing emails | attacker: The men | attacker: they | purpose: wanted to infect | victim: the high - ranking officials
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "phishing", "trigger": "sent", "arguments": [{"name": "the high - ranking officials", "role": "victim"}, {"name": "they", "role": "attacker"}, {"name": "used simple spear - phishing emails", "role": "attack pattern"}, {"name": "wanted to infect", "role": "purpose"}, {"name": "The men", "role": "attacker"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
BEC attacks are essentially Phishing scams , or Spear Phishing since the criminals have a specific target .
|
phishing: Phishing scams
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "phishing", "trigger": "Phishing scams", "arguments": []}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
® In a follow - up statement , WhatsApp denied accusations that it had inserted what amounted to a backdoor in its messaging code : The Guardian posted a story this morning claiming that an intentional design decision in WhatsApp that prevents people from losing millions of messages is a “ backdoor ” allowing governments to force WhatsApp to decrypt message streams .
|
discover vulnerability: posted | discoverer: The Guardian | time: this morning
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "discover vulnerability", "trigger": "posted", "arguments": [{"name": "The Guardian", "role": "discoverer"}, {"name": "this morning", "role": "time"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Nicky works in Tencent ’s Security Platform Department and is responsible for finding vulnerabilities in various products and services .
|
discover vulnerability: is responsible for finding | discoverer: Nicky | vulnerability: vulnerabilities | vulnerable system: services | vulnerable system: various products
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "discover vulnerability", "trigger": "is responsible for finding", "arguments": [{"name": "vulnerabilities", "role": "vulnerability"}, {"name": "various products", "role": "vulnerable system"}, {"name": "services", "role": "vulnerable system"}, {"name": "Nicky", "role": "discoverer"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Other messages threaten the user with police action if payment is not made .
|
ransom: payment is not made | attack pattern: threaten the user with police action | tool: messages
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "payment is not made", "arguments": [{"name": "threaten the user with police action", "role": "attack pattern"}, {"name": "messages", "role": "tool"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
The hacking group has supposedly found vulnerabilities in Snapchat ’s systems and managed to steal 1.7 million user data and leaked them on the dark web .
|
data breach: steal | compromised data: user data | number of data: 1.7 million
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "steal", "arguments": [{"name": "1.7 million", "role": "number of data"}, {"name": "user data", "role": "compromised data"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
— Hacker Fantastic ( @hackerfantastic ) April 14 , 2017 But just hours later , Microsoft announced that many of the vulnerabilities were addressed in a security update released a month ago .
|
patch vulnerability: were addressed | patch: a security update | releaser: Microsoft | vulnerability: the vulnerabilities
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "patch vulnerability", "trigger": "were addressed", "arguments": [{"name": "the vulnerabilities", "role": "vulnerability"}, {"name": "Microsoft", "role": "releaser"}, {"name": "a security update", "role": "patch"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
The IRS advises the bogus email appears to come from the recipient ’s software provider and typically has a subject line that reads something like : “ Software Support Update ” or “ Important Software System Upgrade . ”
|
phishing: appears to come from | tool: the bogus email | trusted entity: the recipient ’s software provider
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "phishing", "trigger": "appears to come from", "arguments": [{"name": "the recipient ’s software provider", "role": "trusted entity"}, {"name": "the bogus email", "role": "tool"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Potential partners also receive payment instantly when a victim pays their ransom , adding another level of transparency to this partnership .
|
ransom: pays their ransom | victim: victim
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "pays their ransom", "arguments": [{"name": "victim", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Hackers leaked 1.4 GB data , which included customers ' financial records , credit card numbers and PIN codes as well as banking details pertaining to the Al - Thani Qatar Royal Family and Al Jazeera journalists .
|
data breach: leaked | attacker: Hackers | compromised data: PIN codes | compromised data: banking details | compromised data: credit card numbers | compromised data: data | compromised data: financial records | number of data: 1.4 GB | victim: customers
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "leaked", "arguments": [{"name": "Hackers", "role": "attacker"}, {"name": "data", "role": "compromised data"}, {"name": "1.4 GB", "role": "number of data"}, {"name": "customers", "role": "victim"}, {"name": "financial records", "role": "compromised data"}, {"name": "credit card numbers", "role": "compromised data"}, {"name": "PIN codes", "role": "compromised data"}, {"name": "banking details", "role": "compromised data"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Most if not all online services have had their fair share of security issues , and most of them managed to get discovered and fixed by people like Ormandy .
|
discover vulnerability: have had their fair share | discoverer: not all online services | vulnerability: security issues
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "discover vulnerability", "trigger": "have had their fair share", "arguments": [{"name": "security issues", "role": "vulnerability"}, {"name": "not all online services", "role": "discoverer"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
In some cases , attackers may have accessed messages and content in chat rooms , HipChat said in a Monday blog post .
|
data breach: have accessed | attacker: attackers | compromised data: content | compromised data: messages | victim: chat rooms
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "have accessed", "arguments": [{"name": "messages", "role": "compromised data"}, {"name": "attackers", "role": "attacker"}, {"name": "content", "role": "compromised data"}, {"name": "chat rooms", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
The ransomware needs to connect to a C&C server to work and to receive the ransom note and warning to display : Interestingly enough , only users of Windows 7 or 10 are in danger from this particular piece of ransomware , as it wo n’t run on other versions of the OS .
|
ransom: receive | attack pattern: connect to a C&C server to work | tool: The ransomware | tool: the ransom note
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "receive", "arguments": [{"name": "The ransomware", "role": "tool"}, {"name": "connect to a C&C server to work", "role": "attack pattern"}, {"name": "the ransom note", "role": "tool"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
In the emails , they did n't ask for a ransom to stop the attacks , but a fee for having already carried out what they called a DDoS protection test .
|
ransom: ask for a ransom | attacker: they
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "ask for a ransom", "arguments": [{"name": "they", "role": "attacker"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
According to its latest notification , however , Neiman Marcus Group now says full payment card numbers and expiration dates were exposed in the 2015 incident .
|
data breach: incident | time: 2015
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "incident", "arguments": [{"name": "2015", "role": "time"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
In Nayana 's first announcement a few days later , it said the hackers demanded 550 bitcoins to free up all the servers -- about $ 1.62 million .
|
ransom: demanded | attacker: the hackers | price: 1.62 million | price: 550 bitcoins | victim: the servers
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "demanded", "arguments": [{"name": "the hackers", "role": "attacker"}, {"name": "550 bitcoins", "role": "price"}, {"name": "the servers", "role": "victim"}, {"name": "1.62 million", "role": "price"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Ransomware perhaps hit healthcare the hardest in 2016 , with some reports claiming 88 percent of all ransomware affected hospitals .
|
ransom: hit | time: 2016 | tool: Ransomware | tool: ransomware | victim: healthcare | victim: hospitals
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "hit", "arguments": [{"name": "2016", "role": "time"}, {"name": "Ransomware", "role": "tool"}, {"name": "ransomware", "role": "tool"}, {"name": "hospitals", "role": "victim"}, {"name": "healthcare", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
In a majority of the cases , once ransomware enters a system , there is no way a user can remove it without losing some files or data , even if one pay the ransom .
|
ransom: pay the ransom | tool: ransomware | victim: a system | victim: a user
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "pay the ransom", "arguments": [{"name": "a system", "role": "victim"}, {"name": "a user", "role": "victim"}, {"name": "ransomware", "role": "tool"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Unfortunately , such a search can be easily replicated – “ even with limited resources such as a standard PC and a broadband DSL connection ” – by individuals or groups intent of discovering vulnerabilities in software for future exploitation .
|
discover vulnerability: discovering | discoverer: groups | discoverer: individuals | vulnerability: vulnerabilities | vulnerable system: software
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "discover vulnerability", "trigger": "discovering", "arguments": [{"name": "software", "role": "vulnerable system"}, {"name": "vulnerabilities", "role": "vulnerability"}, {"name": "groups", "role": "discoverer"}, {"name": "individuals", "role": "discoverer"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Any personal identifiable data a user shared with the app was vulnerable to possible exfiltration by a hacker .
|
discover vulnerability: was vulnerable | vulnerable system: the app
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "discover vulnerability", "trigger": "was vulnerable", "arguments": [{"name": "the app", "role": "vulnerable system"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
The vulnerability was discovered by researchers from the hacking collective the Exploiteers ( formerly GTVHacker ) , who have found vulnerabilities in the Samsung SmartCam devices in the past .
|
discover vulnerability: was discovered | discoverer: GTVHacker | discoverer: researchers | discoverer: the Exploiteers | vulnerability: The vulnerability
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "discover vulnerability", "trigger": "was discovered", "arguments": [{"name": "researchers", "role": "discoverer"}, {"name": "The vulnerability", "role": "vulnerability"}, {"name": "the Exploiteers", "role": "discoverer"}, {"name": "GTVHacker", "role": "discoverer"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
To lure users into downloading , the apps promised a rapid increase in the number of followers , likes and comments for an Instagram account .
|
phishing: lure | trusted entity: the apps | victim: users
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "phishing", "trigger": "lure", "arguments": [{"name": "users", "role": "victim"}, {"name": "the apps", "role": "trusted entity"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Satan 's ransom note instructs victims to install the Tor browser and then redirected to an .
|
ransom: instructs | tool: Satan | tool: ransom note | victim: victims
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "instructs", "arguments": [{"name": "ransom note", "role": "tool"}, {"name": "victims", "role": "victim"}, {"name": "Satan", "role": "tool"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Apple patched the vulnerability with Monday 's release of iOS 10.3.1 .
|
patch vulnerability: patched | releaser: Apple | vulnerability: the vulnerability
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "patch vulnerability", "trigger": "patched", "arguments": [{"name": "the vulnerability", "role": "vulnerability"}, {"name": "Apple", "role": "releaser"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Unfortunately , many people run older versions of Windows , but Microsoft has been very active in issuing patches for them -- including for the now - unsupported XP .
|
patch vulnerability: issuing | patch: patches | releaser: Microsoft | vulnerable system version: XP | vulnerable system version: older versions | vulnerable system: Windows
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "patch vulnerability", "trigger": "issuing", "arguments": [{"name": "Microsoft", "role": "releaser"}, {"name": "Windows", "role": "vulnerable system"}, {"name": "patches", "role": "patch"}, {"name": "older versions", "role": "vulnerable system version"}, {"name": "XP", "role": "vulnerable system version"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
This extract contained only members ’ email addresses and user ID which can be used to find members ’ publicly available online profiles .
|
data breach: extract | compromised data: email addresses | compromised data: user ID | victim: members
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "extract", "arguments": [{"name": "email addresses", "role": "compromised data"}, {"name": "user ID", "role": "compromised data"}, {"name": "members", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Link11 , who tracked those attacks , claimed the group used a DDoS botnet built with the Mirai IoT malware and asked for 5 Bitcoin ( $ 6,000 ) to stop attacks .
|
ransom: asked for | attack pattern: used a DDoS botnet built with the Mirai IoT malware | attacker: the group | price: 5 Bitcoin | price: 6,000
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "asked for", "arguments": [{"name": "5 Bitcoin", "role": "price"}, {"name": "6,000", "role": "price"}, {"name": "used a DDoS botnet built with the Mirai IoT malware", "role": "attack pattern"}, {"name": "the group", "role": "attacker"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Three months on from the global WannaCry cyberattack , someone has withdrawn funds acquired when victims paid ransoms .
|
ransom: paid ransoms | attacker: someone | victim: victims
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "paid ransoms", "arguments": [{"name": "victims", "role": "victim"}, {"name": "someone", "role": "attacker"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
The breach exposed names , contact information , email addresses , purchase histories and the last four digits of payment card numbers .
|
data breach: exposed | compromised data: contact information | compromised data: email addresses | compromised data: names | compromised data: purchase histories | compromised data: the last four digits of payment card numbers
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "exposed", "arguments": [{"name": "names", "role": "compromised data"}, {"name": "contact information", "role": "compromised data"}, {"name": "email addresses", "role": "compromised data"}, {"name": "purchase histories", "role": "compromised data"}, {"name": "the last four digits of payment card numbers", "role": "compromised data"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
The Fatboy ransomware is dynamic in the way it targets its victims ; the amount of ransom demanded is determined by the victim ’s location .
|
ransom: ransom demanded | tool: Fatboy ransomware | victim: victims
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "ransom demanded", "arguments": [{"name": "Fatboy ransomware", "role": "tool"}, {"name": "victims", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
In October , 2016 , 277 ransomware attacks were reported to Government Computer Emergency Response Team in Hong Kong , China .
|
ransom: ransomware attacks | place: China | place: Hong Kong | time: October , 2016
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "ransomware attacks", "arguments": [{"name": "October , 2016", "role": "time"}, {"name": "Hong Kong", "role": "place"}, {"name": "China", "role": "place"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
The first big botnet made up of TVT devices was discovered by Sucuri in June 2016 , consisted of over 25,000 bots , and was used to launch Layer 7 DDoS attacks of up to 50,000 requests per second .
|
discover vulnerability: was discovered | capabilities: launch Layer 7 DDoS attacks | discoverer: Sucuri | time: June 2016 | vulnerable system: TVT devices
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "discover vulnerability", "trigger": "was discovered", "arguments": [{"name": "Sucuri", "role": "discoverer"}, {"name": "June 2016", "role": "time"}, {"name": "TVT devices", "role": "vulnerable system"}, {"name": "launch Layer 7 DDoS attacks", "role": "capabilities"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
It only leaks the username , and whether or not that user has enabled remote access ; but this would provide enough for an attacker to try follow - up phishing attacks to try and get the user 's credentials .
|
data breach: leaks | compromised data: the username
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "leaks", "arguments": [{"name": "the username", "role": "compromised data"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
The presidential election commission said in statement that it would hold a meeting later on Saturday after Macron ’s campaign informed it about the hack and publishing of the data .
|
data breach: hack | compromised data: data
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "hack", "arguments": [{"name": "data", "role": "compromised data"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
The actors charge varying amounts in Bitcoin to provide the decryption keys to the victim .
|
ransom: charge | attacker: The actors | payment method: in Bitcoin | victim: the victim
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "charge", "arguments": [{"name": "in Bitcoin", "role": "payment method"}, {"name": "the victim", "role": "victim"}, {"name": "The actors", "role": "attacker"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Over the past two years , the survey found , the average cost of a data breach to a healthcare organization was more than $ 2.2 million .
|
data breach: a data breach | damage amount: 2.2 million | time: past two years | victim: a healthcare organization
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "a data breach", "arguments": [{"name": "a healthcare organization", "role": "victim"}, {"name": "2.2 million", "role": "damage amount"}, {"name": "past two years", "role": "time"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
At the time , the bank was adamant that the " vast majority " of users were able to gain access to their accounts and move money around as normal .
|
data breach: gain access | compromised data: their accounts | victim: the bank | victim: users
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "gain access", "arguments": [{"name": "users", "role": "victim"}, {"name": "their accounts", "role": "compromised data"}, {"name": "the bank", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
One week ago a global cyberattack dubbed “ unprecedented ” by Europol began infecting an estimated 200,000 of the world ’s computers , starting a seven - day countdown to the destruction of data if victims did not pay a ransom .
|
ransom: a global cyberattack | time: One week ago
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "a global cyberattack", "arguments": [{"name": "One week ago", "role": "time"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
An attacker would have send the victim an email tricking them into clicking through a password reset link , he says .
|
phishing: have send | attacker: An attacker | tool: an email | victim: the victim
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "phishing", "trigger": "have send", "arguments": [{"name": "An attacker", "role": "attacker"}, {"name": "the victim", "role": "victim"}, {"name": "an email", "role": "tool"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Clearly the attacks that this industry has been experiencing are not something casual or fleeting .
|
data breach: the attacks | victim: this industry
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "the attacks", "arguments": [{"name": "this industry", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Cyber security experts reveal they have found a second massive computer virus which has affected hundreds of thousands of computers world - wide , like the WannaCry cyber attack last week , has affected hundreds of thousands of computers world - wide and may have North Korean origins .
|
ransom: WannaCry cyber attack | time: last week | victim: computers
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "WannaCry cyber attack", "arguments": [{"name": "last week", "role": "time"}, {"name": "computers", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
At last count , 110 organizations have reported successful Phishing attacks targeting W - 2 records , placing more than 120,000 taxpayers at risk for identity fraud .
|
phishing: Phishing attacks | purpose: targeting W - 2 records | victim: organizations
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "phishing", "trigger": "Phishing attacks", "arguments": [{"name": "targeting W - 2 records", "role": "purpose"}, {"name": "organizations", "role": "victim"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Nicky works in Tencent ’s Security Platform Department and is responsible for finding vulnerabilities in various products and services .
|
discover vulnerability: is responsible for finding | discoverer: Nicky | vulnerability: vulnerabilities | vulnerable system: services | vulnerable system: various products
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "discover vulnerability", "trigger": "is responsible for finding", "arguments": [{"name": "vulnerabilities", "role": "vulnerability"}, {"name": "various products", "role": "vulnerable system"}, {"name": "services", "role": "vulnerable system"}, {"name": "Nicky", "role": "discoverer"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
Then , in early 2016 , the Callisto Group began sending highly targeted spear phishing emails with malicious attachments that contained , as their final payload , the “ Scout ” malware tool from the HackingTeam RCS Galileo platform .
|
phishing: sending | attacker: the Callisto Group | time: early 2016 | tool: spear phishing emails
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "phishing", "trigger": "sending", "arguments": [{"name": "the Callisto Group", "role": "attacker"}, {"name": "early 2016", "role": "time"}, {"name": "spear phishing emails", "role": "tool"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
They would then proceed to kindly steal your log in details and try to log into your account to take your money .
|
data breach: steal | attacker: They | compromised data: your log in details | purpose: take your money
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "data breach", "trigger": "steal", "arguments": [{"name": "take your money", "role": "purpose"}, {"name": "your log in details", "role": "compromised data"}, {"name": "They", "role": "attacker"}]}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
EE
|
CASIE
|
train
|
Extract events and their components from the text. Format as 'event_type: trigger | role1: argument1 | role2: argument2'. Separate multiple events with '||'. Return 'None' if no events are identified.
|
At the time I was writing , the monitoring to the bitcoin wallet address used to receive the payment of the victims revealed that none has paid the ransom .
|
ransom: has paid the ransom
|
Event types: patch vulnerability, treatment, data breach, phishing, ransom, discover vulnerability. Argument types: price, time, patch number, trusted entity, payment method, number of data, capabilities, tool, patch, supported platform, discoverer, release parole, vulnerable system, vehicle, vulnerability, vulnerable system owner, attack pattern, victim, damage amount, purpose, common vulnerabilities and exposures, place, releaser, compromised data, acquit, vulnerable system version, issues addressed, number of victim, attacker
|
ACE05: acquit, release parole, vehicle, place; PHEE: Treatment
|
{"events": [{"event_type": "ransom", "trigger": "has paid the ransom", "arguments": []}]}
|
You are an expert in Event Extraction.
Your task is to extract events and their arguments from the given text.
Follow these guidelines:
1. Identify event triggers and their types from the schema.
2. For each event, extract its arguments with their roles.
3. Format as 'event_type: trigger | role1: argument1 | role2: argument2' with events separated by '||'.
4. If no events are found, return 'None'.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.