Similar vulnerability query based on text mining

Jin Yi, Runpu Wu, Juan Li, Qi Xiong, Fajiang Yu, Tao Peng, Zhenyu Yang, Bo Han. Similar vulnerability query based on text mining. In 11th International Symposium on Communications and Information Technologies, ISCIT 2011, Hangzhou, China, October 12-14, 2011. pages 339-342, IEEE, 2011. [doi]

Authors

Jin Yi

This author has not been identified. Look up 'Jin Yi' in Google

Runpu Wu

This author has not been identified. Look up 'Runpu Wu' in Google

Juan Li

This author has not been identified. Look up 'Juan Li' in Google

Qi Xiong

This author has not been identified. Look up 'Qi Xiong' in Google

Fajiang Yu

This author has not been identified. Look up 'Fajiang Yu' in Google

Tao Peng

This author has not been identified. Look up 'Tao Peng' in Google

Zhenyu Yang

This author has not been identified. Look up 'Zhenyu Yang' in Google

Bo Han

This author has not been identified. Look up 'Bo Han' in Google