Similar vulnerability query based on text mining

Jin Yi, Runpu Wu, Juan Li, Qi Xiong, Fajiang Yu, Tao Peng, Zhenyu Yang, Bo Han. Similar vulnerability query based on text mining. In 11th International Symposium on Communications and Information Technologies, ISCIT 2011, Hangzhou, China, October 12-14, 2011. pages 339-342, IEEE, 2011. [doi]

@inproceedings{YiWLXYPYH11,
  title = {Similar vulnerability query based on text mining},
  author = {Jin Yi and Runpu Wu and Juan Li and Qi Xiong and Fajiang Yu and Tao Peng and Zhenyu Yang and Bo Han},
  year = {2011},
  doi = {10.1109/ISCIT.2011.6089949},
  url = {http://dx.doi.org/10.1109/ISCIT.2011.6089949},
  researchr = {https://researchr.org/publication/YiWLXYPYH11},
  cites = {0},
  citedby = {0},
  pages = {339-342},
  booktitle = {11th International Symposium on Communications and Information Technologies, ISCIT 2011, Hangzhou, China, October 12-14, 2011},
  publisher = {IEEE},
  isbn = {978-1-4577-1294-4},
}