Similar vulnerability query based on text mining

Jin Yi, Runpu Wu, Juan Li, Qi Xiong, Fajiang Yu, Tao Peng, Zhenyu Yang, Bo Han. Similar vulnerability query based on text mining. In 11th International Symposium on Communications and Information Technologies, ISCIT 2011, Hangzhou, China, October 12-14, 2011. pages 339-342, IEEE, 2011. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.