{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T17:19:14Z","timestamp":1767374354895},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642284892"},{"type":"electronic","value":"9783642284908"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28490-8_29","type":"book-chapter","created":{"date-parts":[[2012,3,14]],"date-time":"2012-03-14T06:05:53Z","timestamp":1331705153000},"page":"274-283","source":"Crossref","is-referenced-by-count":7,"title":["Network Vulnerability Analysis Using Text Mining"],"prefix":"10.1007","author":[{"given":"Chungang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jianhua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiuzhen","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"CERT Statistics (1995-2208), \n                    \n                      http:\/\/www.cert.org\/stats\/"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Foreman, P.: Vulnerability Management. Taylor & Francis Group (2010)","DOI":"10.1201\/9781439801512"},{"key":"29_CR3","unstructured":"Baldwin, R.: Rule based analysis of computer security, Technical Report TR-401, MIT LCS Lab (1988)"},{"key":"29_CR4","unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: A logic-based network security analyzer. In: 14th USENIX Security Symposium, Society for Industrial and Applied Mathematics (2005)"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Vache, G.: Vulnerability analysis for a quantitative security evaluation. In: Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement (2009)","DOI":"10.1109\/ESEM.2009.5315969"},{"key":"29_CR6","first-page":"809","volume":"6","author":"M. Ben-Dov","year":"2010","unstructured":"Ben-Dov, M., Feldman, R.: Text Mining and Information Extraction. Part\u00a06, 809\u2013835 (2010)","journal-title":"Part"},{"key":"29_CR7","volume-title":"Proceedings of the 37th Conference on Association for Computational Linguistics","author":"M.A. Hearst","year":"1999","unstructured":"Hearst, M.A.: Untangling text data mining. In: Proceedings of the 37th Conference on Association for Computational Linguistics. Association for Computational Linguistics, College Park, Maryland (1999)"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Porter, M.: An algorithm for suffix stripping. Program, 130\u2013137 (1980)","DOI":"10.1108\/eb046814"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Metzler, D.: Generalized inverse document frequency. In: Proceeding of the 17th ACM Conference on Information and Knowledge Management (2008)","DOI":"10.1145\/1458082.1458137"},{"key":"29_CR10","unstructured":"Pudil, P., Somol, P.: Current Feature Selection Techniques in Statistical Pattern Recognition. In: Computer Recognition Systems. Advances in Soft Computing, vol.\u00a030 (2005)"},{"issue":"3","key":"29_CR11","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1145\/183422.183424","volume":"12","author":"Y. Yang","year":"1994","unstructured":"Yang, Y., Chute, C.G.: An example-based mapping method for text categorization and retrieval. ACM Transactions on Information Systems\u00a012(3), 252\u2013277 (1994)","journal-title":"ACM Transactions on Information Systems"},{"key":"29_CR12","volume-title":"Proceedings of ECML1998, 10th European Conference on Machine Learning","author":"D.D. Lewis","year":"1998","unstructured":"Lewis, D.D.: Naive (Bayes) at forty: the independence assumption in information retrieval. In: Nedellec, C., Rouveirol, C. (eds.) Proceedings of ECML1998, 10th European Conference on Machine Learning. Springer, Heidelberg (1998)"},{"issue":"3","key":"29_CR13","first-page":"273","volume":"20","author":"C. Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Machine learning\u00a020(3), 273\u2013297 (1995)","journal-title":"Machine learning"},{"key":"29_CR14","unstructured":"Hsu, C.W., Lin, C.J.: A comparison on methods for multi-class support vector machines. IEEE Transactions on Neutral Networks (2002)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28490-8_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T17:09:26Z","timestamp":1556471366000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28490-8_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642284892","9783642284908"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28490-8_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}