{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T05:49:07Z","timestamp":1772776147203,"version":"3.50.1"},"reference-count":93,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,8,11]],"date-time":"2023-08-11T00:00:00Z","timestamp":1691712000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,11]],"date-time":"2023-08-11T00:00:00Z","timestamp":1691712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10207-023-00734-7","type":"journal-article","created":{"date-parts":[[2023,8,11]],"date-time":"2023-08-11T07:02:25Z","timestamp":1691737345000},"page":"247-270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Estimating vulnerability metrics with word embedding and multiclass classification methods"],"prefix":"10.1007","volume":"23","author":[{"given":"Hakan","family":"Kek\u00fcl","sequence":"first","affiliation":[]},{"given":"Burhan","family":"Ergen","sequence":"additional","affiliation":[]},{"given":"Halil","family":"Arslan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,11]]},"reference":[{"key":"734_CR1","volume-title":"The State of Cybersecurity in Mexico: An Overview","author":"LP Kobek","year":"2017","unstructured":"Kobek, L.P.: The State of Cybersecurity in Mexico: An Overview. Wilson Centre\u2019s Mexico Institute, Washington (2017)"},{"issue":"4","key":"734_CR2","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/3092566","volume":"50","author":"SM Ghaffarian","year":"2017","unstructured":"Ghaffarian, S.M., Shahriari, H.R.: Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey. ACM Comput. Surv. 50(4), 36 (2017). https:\/\/doi.org\/10.1145\/3092566","journal-title":"ACM Comput. Surv."},{"issue":"11","key":"734_CR3","doi-asserted-by":"publisher","first-page":"63","DOI":"10.4230\/DagRep.6.11.63","volume":"6","author":"TW Moore","year":"2017","unstructured":"Moore, T.W., Probst, C.W., Rannenberg, K., van Eeten, M.: Assessing ICT security risks in socio-technical systems (Dagstuhl Seminar 16461). Dagstuhl Rep. 6(11), 63\u201389 (2017). https:\/\/doi.org\/10.4230\/DagRep.6.11.63","journal-title":"Dagstuhl Rep."},{"key":"734_CR4","unstructured":"NVD, \u201cNVD,\u201d National Vulnerability Database. https:\/\/nvd.nist.gov (2020). Accessed 25 July 2020"},{"key":"734_CR5","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jss.2018.09.039","volume":"146","author":"G Spanos","year":"2018","unstructured":"Spanos, G., Angelis, L.: A multi-target approach to estimate software vulnerability characteristics and severity scores. J. Syst. Softw. 146, 152\u2013166 (2018). https:\/\/doi.org\/10.1016\/j.jss.2018.09.039","journal-title":"J. Syst. Softw."},{"issue":"2","key":"734_CR6","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.aci.2017.12.002","volume":"15","author":"J Ruohonen","year":"2019","unstructured":"Ruohonen, J.: A look at the time delays in CVSS vulnerability scoring. Appl. Comput. Inform. 15(2), 129\u2013135 (2019). https:\/\/doi.org\/10.1016\/j.aci.2017.12.002","journal-title":"Appl. Comput. Inform."},{"key":"734_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.106204","author":"C Theisen","year":"2019","unstructured":"Theisen, C., Williams, L.: Better together: comparing vulnerability prediction models. Inf. Softw. Technol. (2019). https:\/\/doi.org\/10.1016\/j.infsof.2019.106204","journal-title":"Inf. Softw. Technol."},{"issue":"7","key":"734_CR8","doi-asserted-by":"publisher","first-page":"2555","DOI":"10.3390\/app10072555","volume":"10","author":"H Yang","year":"2020","unstructured":"Yang, H., Park, S., Yim, K., Lee, M.: Better not to use vulnerability\u2019s reference for exploitability prediction. Appl. Sci. (Switzerland) 10(7), 2555 (2020). https:\/\/doi.org\/10.3390\/app10072555","journal-title":"Appl. Sci. (Switzerland)"},{"key":"734_CR9","doi-asserted-by":"crossref","unstructured":"IBM, Cost of a Data Breach Report. https:\/\/www.ibm.com\/reports\/data-breach (2022). 23 June 2023","DOI":"10.12968\/S1353-4858(22)70049-9"},{"key":"734_CR10","unstructured":"\u201cMitre Corporation,\u201d 2020. https:\/\/www.mitre.org (2020). Accessed 25 July 2020"},{"issue":"1","key":"734_CR11","doi-asserted-by":"publisher","first-page":"6","DOI":"10.18640\/ubgmd.303598","volume":"3","author":"O Bozoklu","year":"2017","unstructured":"Bozoklu, O., \u00c7il, C.Z.: Yaz\u0131l\u0131m G\u00fcvenlik A\u00e7\u0131\u011f\u0131 Ekosistemi Ve T\u00fcrkiye\u2019deki Durum De\u011ferlendirmesi. Uluslararas\u0131 Bilgi G\u00fcvenli\u011fi M\u00fchendisli\u011fi Dergisi 3(1), 6\u201326 (2017)","journal-title":"Uluslararas\u0131 Bilgi G\u00fcvenli\u011fi M\u00fchendisli\u011fi Dergisi"},{"key":"734_CR12","first-page":"1008","volume":"28","author":"H Kek\u00fcl","year":"2021","unstructured":"Kek\u00fcl, H., Ergen, B., Arslan, H.: Yaz\u0131l\u0131m G\u00fcvenlik A\u00e7\u0131\u011f\u0131 Veri Tabanlar\u0131. Avrupa Bilim ve Teknoloji Dergisi 28, 1008\u20131012 (2021)","journal-title":"Avrupa Bilim ve Teknoloji Dergisi"},{"key":"734_CR13","unstructured":"CVE, \u201cCVE,\u201d Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org (2020). Accessed 25 July 2020"},{"key":"734_CR14","unstructured":"Mell, P., Scarfone, K., Romanosky, S.: A complete guide to the common vulnerability scoring system version 2.0. FIRSTForum of Incident Response and Security Teams. https:\/\/www.first.org\/cvss\/cvss-v2-guide.pdf (2007). Accessed 01 Jan 2021"},{"key":"734_CR15","unstructured":"Common Vulnerability Scoring System v3.1: User Guide. https:\/\/www.first.org\/cvss\/v3.1\/user-guide (2021). Accessed 01 Jan 2021"},{"key":"734_CR16","doi-asserted-by":"publisher","first-page":"110456","DOI":"10.1016\/j.jss.2019.110456","volume":"160","author":"X Wu","year":"2020","unstructured":"Wu, X., Zheng, W., Chen, X., Wang, F., Mu, D.: CVE-assisted large-scale security bug report dataset construction method. J. Syst. Softw. 160, 110456 (2020). https:\/\/doi.org\/10.1016\/j.jss.2019.110456","journal-title":"J. Syst. Softw."},{"issue":"4","key":"734_CR17","doi-asserted-by":"publisher","first-page":"1270","DOI":"10.3390\/app10041270","volume":"10","author":"R Raducu","year":"2020","unstructured":"Raducu, R., Esteban, G., Lera, F.J.R., Fern\u00e1ndez, C.: Collecting vulnerable source code from open-source repositories for dataset generation. Appl. Sci. (Switzerland) 10(4), 1270 (2020). https:\/\/doi.org\/10.3390\/app10041270","journal-title":"Appl. Sci. (Switzerland)"},{"key":"734_CR18","doi-asserted-by":"publisher","unstructured":"Miyamoto, D., Yamamoto, Y., Nakayama, M.: Text-mining approach for estimating vulnerability score. In: Proceedings\u20142015 4th \u0131nternational workshop on building analysis datasets and gathering experience returns for security, BADGERS 2015, pp. 67\u201373 (2017). https:\/\/doi.org\/10.1109\/BADGERS.2015.12","DOI":"10.1109\/BADGERS.2015.12"},{"key":"734_CR19","doi-asserted-by":"crossref","unstructured":"D. Hin, A. Kan, H. Chen, and M. A. Babar, \u201cLineVD: statement-level vulnerability detection using graph neural networks,\u201d in Proceedings of the 19th International Conference on Mining Software Repositories, 2022, pp. 596\u2013607.","DOI":"10.1145\/3524842.3527949"},{"issue":"2","key":"734_CR20","first-page":"1471","volume":"67","author":"K Sahu","year":"2021","unstructured":"Sahu, K., Alzahrani, F.A., Srivastava, R.K., Kumar, R.: Evaluating the impact of prediction techniques: software reliability perspective. Comput. Mater. Contin. 67(2), 1471\u20131488 (2021)","journal-title":"Comput. Mater. Contin."},{"issue":"11","key":"734_CR21","doi-asserted-by":"publisher","first-page":"1770","DOI":"10.3390\/sym12111770","volume":"12","author":"K Sahu","year":"2020","unstructured":"Sahu, K., Alzahrani, F.A., Srivastava, R.K., Kumar, R.: Hesitant fuzzy sets based symmetrical model of decision-making for estimating the durability of web application. Symmetry (Basel) 12(11), 1770 (2020)","journal-title":"Symmetry (Basel)"},{"key":"734_CR22","first-page":"19","volume":"17","author":"K Sahu","year":"2018","unstructured":"Sahu, K., Srivastava, R.K.: Soft computing approach for prediction of software reliability. Neural Netw. 17, 19 (2018)","journal-title":"Neural Netw."},{"key":"734_CR23","doi-asserted-by":"publisher","unstructured":"J\u00e1nos, F.D., Huu Phuoc Dai, N.: Security concerns towards security operations centers. \u0130n: 2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI), 2018, pp. 273\u2013278 (2018) https:\/\/doi.org\/10.1109\/SACI.2018.8440963","DOI":"10.1109\/SACI.2018.8440963"},{"key":"734_CR24","doi-asserted-by":"publisher","first-page":"100011","DOI":"10.1016\/j.array.2019.100011","volume":"3\u20134","author":"K Kritikos","year":"2019","unstructured":"Kritikos, K., Magoutis, K., Papoutsakis, M., Ioannidis, S.: A survey on vulnerability assessment tools and databases for cloud-based web applications. Array 3\u20134, 100011 (2019). https:\/\/doi.org\/10.1016\/j.array.2019.100011","journal-title":"Array"},{"key":"734_CR25","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.ins.2020.11.053","volume":"553","author":"SM Ghaffarian","year":"2021","unstructured":"Ghaffarian, S.M., Shahriari, H.R.: Neural software vulnerability analysis using rich intermediate graph representations of programs. Inf. Sci. (N Y) 553, 189\u2013207 (2021). https:\/\/doi.org\/10.1016\/j.ins.2020.11.053","journal-title":"Inf. Sci. (N Y)"},{"issue":"11","key":"734_CR26","doi-asserted-by":"publisher","first-page":"8271","DOI":"10.1007\/s10489-021-02324-3","volume":"51","author":"CB \u015eahin","year":"2021","unstructured":"\u015eahin, C.B., Dinler, \u00d6.B., Abualigah, L.: Prediction of software vulnerability based deep symbiotic genetic algorithms: phenotyping of dominant-features. Appl. Intell. 51(11), 8271\u20138287 (2021). https:\/\/doi.org\/10.1007\/s10489-021-02324-3","journal-title":"Appl. Intell."},{"issue":"2","key":"734_CR27","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.32604\/iasc.2022.022569","volume":"32","author":"A Attaallah","year":"2022","unstructured":"Attaallah, A., Alsuhabi, H., Shukla, S., Kumar, R., Gupta, B.K., Khan, R.A.: Analyzing the big data security through a unified decision-making approach. Intell. Autom. Soft Comput. 32(2), 1071\u20131088 (2022)","journal-title":"Intell. Autom. Soft Comput."},{"issue":"3","key":"734_CR28","doi-asserted-by":"publisher","first-page":"1763","DOI":"10.32604\/iasc.2022.023460","volume":"32","author":"AH Almulihi","year":"2022","unstructured":"Almulihi, A.H., Alassery, F., Khan, A.I., Shukla, S., Gupta, B.K., Kumar, R.: Analyzing the \u0131mplications of healthcare data breaches through computational technique. Intell. Autom. Soft Comput. 32(3), 1763\u20131779 (2022)","journal-title":"Intell. Autom. Soft Comput."},{"issue":"1","key":"734_CR29","doi-asserted-by":"publisher","first-page":"33","DOI":"10.18576\/isl\/090105","volume":"9","author":"K Sahu","year":"2020","unstructured":"Sahu, K., Srivastava, R.K.: Needs and importance of reliability prediction: an industrial perspective. Inf. Sci. Lett. 9(1), 33\u201337 (2020)","journal-title":"Inf. Sci. Lett."},{"issue":"1","key":"734_CR30","first-page":"543","volume":"10","author":"K Sahu","year":"2021","unstructured":"Sahu, K., Srivastava, R.K.: Predicting software bugs of newly and large datasets through a unified neuro-fuzzy approach: reliability perspective. Adv. Math.: Sci. J. 10(1), 543\u2013555 (2021)","journal-title":"Adv. Math.: Sci. J."},{"key":"734_CR31","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.jss.2019.06.001","volume":"156","author":"ER Russo","year":"2019","unstructured":"Russo, E.R., Di Sorbo, A., Visaggio, C.A., Canfora, G.: Summarizing vulnerabilities\u2019 descriptions to support experts during vulnerability assessment activities. J. Syst. Softw. 156, 84\u201399 (2019). https:\/\/doi.org\/10.1016\/j.jss.2019.06.001","journal-title":"J. Syst. Softw."},{"key":"734_CR32","doi-asserted-by":"publisher","first-page":"101610","DOI":"10.1016\/j.cose.2019.101610","volume":"88","author":"E Yasasin","year":"2020","unstructured":"Yasasin, E., Prester, J., Wagner, G., Schryen, G.: Forecasting IT security vulnerabilities\u2014an empirical analysis. Comput Secur 88, 101610 (2020). https:\/\/doi.org\/10.1016\/j.cose.2019.101610","journal-title":"Comput Secur"},{"issue":"1","key":"734_CR33","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/s13198-020-01021-7","volume":"12","author":"R Sharma","year":"2021","unstructured":"Sharma, R., Sibal, R., Sabharwal, S.: Software vulnerability prioritization using vulnerability description. Int. J. Syst. Assur. Eng. Manag. 12(1), 58\u201364 (2021). https:\/\/doi.org\/10.1007\/s13198-020-01021-7","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"734_CR34","doi-asserted-by":"crossref","unstructured":"Malhotra, R., Vidushi: Severity prediction of software vulnerabilities using textual data. In: Gunjan, V.K., Zurada, J.M. (eds.) Proceedings of \u0131nternational conference on recent trends in machine learning, IoT, smart cities and applications. Springer, Singapore, pp. 453\u2013464 (2021)","DOI":"10.1007\/978-981-15-7234-0_41"},{"key":"734_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111790","author":"X Sun","year":"2023","unstructured":"Sun, X., et al.: Automatic software vulnerability assessment by extracting vulnerability elements. J. Syst. Softw. (2023). https:\/\/doi.org\/10.1016\/j.jss.2023.111790","journal-title":"J. Syst. Softw."},{"key":"734_CR36","doi-asserted-by":"publisher","first-page":"103070","DOI":"10.1016\/j.cose.2022.103070","volume":"126","author":"Q Wang","year":"2023","unstructured":"Wang, Q., Gao, Y., Ren, J., Zhang, B.: An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network. Comput. Secur. 126, 103070 (2023). https:\/\/doi.org\/10.1016\/j.cose.2022.103070","journal-title":"Comput. Secur."},{"key":"734_CR37","doi-asserted-by":"publisher","first-page":"103028","DOI":"10.1016\/j.jisa.2021.103028","volume":"63","author":"H Kek\u00fcl","year":"2021","unstructured":"Kek\u00fcl, H., Ergen, B., Arslan, H.: A multiclass hybrid approach to estimating software vulnerability vectors and severity score. J. Inf. Secur. Appl. 63, 103028 (2021). https:\/\/doi.org\/10.1016\/j.jisa.2021.103028","journal-title":"J. Inf. Secur. Appl."},{"issue":"2","key":"734_CR38","first-page":"151","volume":"1","author":"V-V Patriciu","year":"2006","unstructured":"Patriciu, V.-V., Priescu, I., Nicolaescu, S.: Security metrics for enterprise information systems. J. Appl. Quant. Methods 1(2), 151\u2013159 (2006)","journal-title":"J. Appl. Quant. Methods"},{"key":"734_CR39","unstructured":"Schiffman, M., Cisco, C.I.A.G.: A complete guide to the common vulnerability scoring system (CVSS) v1 Archive. https:\/\/www.first.org\/cvss\/v1\/guide (2005). Accessed 01 Jan 2021"},{"key":"734_CR40","doi-asserted-by":"publisher","unstructured":"Spanos, G., Sioziou, A., Angelis, L.: WIVSS: a new methodology for scoring \u0131nformation systems vulnerabilities. \u0130n: Proceedings of the 17th Panhellenic Conference on Informatics. \u0130n: PCI \u201913. New York, NY, USA: Association for Computing Machinery, pp. 83\u201390 (2013) https:\/\/doi.org\/10.1145\/2491845.2491871","DOI":"10.1145\/2491845.2491871"},{"issue":"1\u20133","key":"734_CR41","first-page":"57","volume":"24","author":"G Spanos","year":"2015","unstructured":"Spanos, G., Angelis, L.: Impact metrics of security vulnerabilities: analysis and weighing. Inf. Secur. J.: A Glob. Perspect. 24(1\u20133), 57\u201371 (2015)","journal-title":"Inf. Secur. J.: A Glob. Perspect."},{"key":"734_CR42","unstructured":"Schiffman Mike, C.C.: Complete CVSS v1 Guide.\u201d https:\/\/www.first.org\/cvss\/v1\/guide (2023). Accessed 02 May 2023"},{"key":"734_CR43","doi-asserted-by":"crossref","unstructured":"Mell, P., Scarfone, K., Romanosky, S.: A complete guide to the common vulnerability scoring system Version 2.0. (2007)","DOI":"10.1049\/iet-ifs:20060055"},{"key":"734_CR44","unstructured":"Common Vulnerability Scoring System v3.0: Specification Document. Accessed 02 May 2023. (online). Available: https:\/\/www.first.org\/cvss\/examples"},{"key":"734_CR45","unstructured":"Common Vulnerability Scoring System version 3.1 Specification Document Revision 1. (online). Available: https:\/\/www.first.org\/cvss\/ (2023). Accessed 02 May 2023"},{"issue":"2","key":"734_CR46","doi-asserted-by":"publisher","first-page":"52","DOI":"10.3390\/info12020052","volume":"12","author":"A Fesseha","year":"2021","unstructured":"Fesseha, A., Xiong, S., Emiru, E.D., Diallo, M., Dahou, A.: Text classification based on convolutional neural networks and word embedding for low-resource languages: tigrinya. Information 12(2), 52 (2021). https:\/\/doi.org\/10.3390\/info12020052","journal-title":"Information"},{"key":"734_CR47","volume-title":"Python 3 Reference Manual","author":"G Van Rossum","year":"2009","unstructured":"Van Rossum, G., Drake, F.L.: Python 3 Reference Manual. CreateSpace, Scotts Valley, CA (2009)"},{"key":"734_CR48","volume-title":"Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit","author":"S Bird","year":"2009","unstructured":"Bird, S., Klein, E., Loper, E.: Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit. O\u2019Reilly Media Inc, Sebastopol (2009)"},{"key":"734_CR49","unstructured":"\u0158ehu\u0159ek, R., Sojka, P.: Software framework for topic modelling with large corpora. \u0130n: Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks, Valletta, Malta: ELRA, May 2010, pp. 45\u201350 (2010)"},{"key":"734_CR50","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"issue":"7825","key":"734_CR51","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1038\/s41586-020-2649-2","volume":"585","author":"CR Harris","year":"2020","unstructured":"Harris, C.R., et al.: Array programming with NumPy. Nature 585(7825), 357\u2013362 (2020). https:\/\/doi.org\/10.1038\/s41586-020-2649-2","journal-title":"Nature"},{"key":"734_CR52","doi-asserted-by":"crossref","unstructured":"McKinney, W., et al.: Data structures for statistical computing in python. In: Proceedings of the 9th Python in Science Conference, pp. 51\u201356 (2010)","DOI":"10.25080\/Majora-92bf1922-00a"},{"issue":"1","key":"734_CR53","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.ipm.2013.08.006","volume":"50","author":"AK Uysal","year":"2014","unstructured":"Uysal, A.K., Gunal, S.: The impact of preprocessing on text classification. Inf. Process. Manag. 50(1), 104\u2013112 (2014). https:\/\/doi.org\/10.1016\/j.ipm.2013.08.006","journal-title":"Inf. Process. Manag."},{"key":"734_CR54","first-page":"8887","volume":"975","author":"G Gupta","year":"2015","unstructured":"Gupta, G., Malhotra, S.: Text document tokenization for word frequency count using rapid miner (taking resume as an example). Int. J. Comput. Appl 975, 8887 (2015)","journal-title":"Int. J. Comput. Appl"},{"issue":"2","key":"734_CR55","first-page":"16","volume":"7","author":"T Verma","year":"2014","unstructured":"Verma, T., Renu, R., Gaur, D.: Tokenization and filtering process in RapidMiner. Int. J. Appl. Inf. Syst. 7(2), 16\u201318 (2014)","journal-title":"Int. J. Appl. Inf. Syst."},{"issue":"1","key":"734_CR56","first-page":"150","volume":"11","author":"AA Jalal","year":"2021","unstructured":"Jalal, A.A., Ali, B.H.: Text documents clustering using data mining techniques. Int. J. Electr. Comput. Eng. (2088-8708) 11(1), 150 (2021)","journal-title":"Int. J. Electr. Comput. Eng. (2088-8708)"},{"issue":"4","key":"734_CR57","doi-asserted-by":"publisher","first-page":"150","DOI":"10.3390\/info10040150","volume":"10","author":"K Kowsari","year":"2019","unstructured":"Kowsari, K., Jafari Meimandi, K., Heidarysafa, M., Mendu, S., Barnes, L., Brown, D.: Text classification algorithms: a survey. Information 10(4), 150 (2019)","journal-title":"Information"},{"issue":"1\u20134","key":"734_CR58","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s13042-010-0001-0","volume":"1","author":"Y Zhang","year":"2010","unstructured":"Zhang, Y., Jin, R., Zhou, Z.-H.: Understanding bag-of-words model: a statistical framework. Int. J. Mach. Learn. Cybern. 1(1\u20134), 43\u201352 (2010)","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"1","key":"734_CR59","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/S0306-4573(02)00021-3","volume":"39","author":"A Aizawa","year":"2003","unstructured":"Aizawa, A.: An information-theoretic perspective of tf\u2013idf measures. Inf Process Manag 39(1), 45\u201365 (2003)","journal-title":"Inf Process Manag"},{"key":"734_CR60","doi-asserted-by":"crossref","unstructured":"Banerjee, S., Pedersen, T.: The design, implementation, and use of the ngram statistics package. \u0130n: International Conference on Intelligent Text Processing and Computational Linguistics, pp. 370\u2013381 (2003)","DOI":"10.1007\/3-540-36456-0_38"},{"key":"734_CR61","doi-asserted-by":"publisher","unstructured":"Aydo\u011fan, M., Karci, A.: Turkish text classification with machine learning and transfer learning. \u0130n: 2019 International Artificial Intelligence and Data Processing Symposium (IDAP), pp. 1\u20136 (2019).https:\/\/doi.org\/10.1109\/IDAP.2019.8875919","DOI":"10.1109\/IDAP.2019.8875919"},{"key":"734_CR62","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality. \u0130n: Advances in Neural \u0130nformation Processing Systems pp. 3111\u20133119 (2013)"},{"key":"734_CR63","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space (2013) arXiv preprint arXiv:1301.3781"},{"key":"734_CR64","unstructured":"Le, Q., Mikolov, T.: Distributed representations of sentences and documents. \u0130n: International Conference on Machine Learning. pp. 1188\u20131196 (2014)"},{"key":"734_CR65","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1162\/tacl_a_00051","volume":"5","author":"P Bojanowski","year":"2017","unstructured":"Bojanowski, P., Grave, E., Joulin, A., Mikolov, T.: Enriching word vectors with subword information. Trans. Assoc. Comput. Linguist. 5, 135\u2013146 (2017)","journal-title":"Trans. Assoc. Comput. Linguist."},{"key":"734_CR66","doi-asserted-by":"crossref","unstructured":"Su, Y., Lin, R., Kuo, C.: Tree-structured multi-stage principal component analysis (TMPCA): theory and applications. Expert systems with applications 118, 355\u2013364 (2019)","DOI":"10.1016\/j.eswa.2018.10.020"},{"key":"734_CR67","unstructured":"Aggarwal, S., Kaur, D.: Naive bayes classifier with various smoothing techniques for text documents. Int J Comput Trends Technol 4(4), 873\u2013876 (2013)"},{"key":"734_CR68","volume-title":"Classification and Regression Trees","author":"L Breiman","year":"1984","unstructured":"Breiman, L., Friedman, J., Stone, C.J., Olshen, R.A.: Classification and Regression Trees. CRC Press, Boca Raton (1984)"},{"key":"734_CR69","unstructured":"Fix, E.: Discriminatory analysis: nonparametric discrimination, consistency properties. USAF school of Aviation Medicine 1, (1985)"},{"issue":"4","key":"734_CR70","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BF02478259","volume":"5","author":"WS McCulloch","year":"1943","unstructured":"McCulloch, W.S., Pitts, W.: A logical calculus of the ideas immanent in nervous activity. Bull. Math. Biophys. 5(4), 115\u2013133 (1943)","journal-title":"Bull. Math. Biophys."},{"issue":"1","key":"734_CR71","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"734_CR72","unstructured":"Kohavi, R., et al.: A study of cross-validation and bootstrap for accuracy estimation and model selection. \u0130n IJCA\u0130, pp. 1137\u20131145 (1995)"},{"key":"734_CR73","first-page":"2079","volume":"11","author":"GC Cawley","year":"2010","unstructured":"Cawley, G.C., Talbot, N.L.C.: On over-fitting in model selection and subsequent selection bias in performance evaluation. J. Mach. Learn. Res. 11, 2079\u20132107 (2010)","journal-title":"J. Mach. Learn. Res."},{"key":"734_CR74","doi-asserted-by":"crossref","unstructured":"Norvig, P.R., Intelligence, SA.: A modern approach. Prentice hall upper saddle river, NJ, USA: Rani, M., Nayak, R., & Vyas, OP: An ontology-based adaptive personalized e-learning system, assisted by software agents on cloud storage. Knowledge-Based Systems 90(2002), 33\u201348 (2015)","DOI":"10.1016\/j.knosys.2015.10.002"},{"key":"734_CR75","unstructured":"Rennie, J.D., Shih, L., Teevan, J., Karger, D.R.: Tackling the poor assumptions of naive bayes text classifiers. \u0130n: Proceedings of the 20th \u0130nternational Conference on Machine Learning (ICML-03), pp. 616\u2013623 (2003)"},{"key":"734_CR76","unstructured":"Mallory, E.K., Acharya, A., Rensi, S.E., Turnbaugh, P.J., Bright, R.A., Altman, R.B.: Chemical reaction vector embeddings: towards predicting drug metabolism in the human gut microbiome. \u0130n: PSB, pp. 56\u201367 (2018)"},{"issue":"1","key":"734_CR77","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s10100-017-0479-6","volume":"26","author":"B Kami\u0144ski","year":"2018","unstructured":"Kami\u0144ski, B., Jakubczyk, M., Szufel, P.: A framework for sensitivity analysis of decision trees. Cent. Eur. J. Oper. Res 26(1), 135\u2013159 (2018). https:\/\/doi.org\/10.1007\/s10100-017-0479-6","journal-title":"Cent. Eur. J. Oper. Res"},{"issue":"3","key":"734_CR78","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/S0020-7373(87)80053-6","volume":"27","author":"JR Quinlan","year":"1987","unstructured":"Quinlan, J.R.: Simplifying decision trees. Int. J. Man Mach. Stud. 27(3), 221\u2013234 (1987). https:\/\/doi.org\/10.1016\/S0020-7373(87)80053-6","journal-title":"Int. J. Man Mach. Stud."},{"issue":"3","key":"734_CR79","doi-asserted-by":"publisher","first-page":"3797","DOI":"10.1007\/s11042-018-6083-5","volume":"78","author":"X Deng","year":"2019","unstructured":"Deng, X., Li, Y., Weng, J., Zhang, J.: Feature selection for text classification: a review. Multimed. Tools Appl. 78(3), 3797\u20133816 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"734_CR80","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1016\/j.procs.2020.02.053","volume":"166","author":"Z Chen","year":"2020","unstructured":"Chen, Z., Zhou, L.J., Da Li, X., Zhang, J.N., Huo, W.J.: The Lao Text Classification Method Based on KNN. Procedia Comput. Sci. 166, 523\u2013528 (2020). https:\/\/doi.org\/10.1016\/j.procs.2020.02.053","journal-title":"Procedia Comput. Sci."},{"key":"734_CR81","doi-asserted-by":"publisher","unstructured":"Tan, Y.: An \u0131mproved KNN text classification algorithm based on K-medoids and rough set. \u0130n: 2018 10th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), pp. 109\u2013113 (2018). https:\/\/doi.org\/10.1109\/IHMSC.2018.00032","DOI":"10.1109\/IHMSC.2018.00032"},{"issue":"1","key":"734_CR82","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1023\/A:1009982220290","volume":"1","author":"Y Yang","year":"1999","unstructured":"Yang, Y.: An evaluation of statistical approaches to text categorization. Inf. Retr. Boston 1(1), 69\u201390 (1999)","journal-title":"Inf. Retr. Boston"},{"key":"734_CR83","doi-asserted-by":"crossref","unstructured":"Rosenblatt, F.: Principles of neurodynamics: Perceptrons and the theory of brain mechanisms, vol. 55. Spartan books, Washington, DC (1962)","DOI":"10.21236\/AD0256582"},{"key":"734_CR84","doi-asserted-by":"crossref","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning internal representations by error propagation. California Univ San Diego La Jolla Inst For Cognitive Science, Technical rept (1985)","DOI":"10.21236\/ADA164453"},{"issue":"4","key":"734_CR85","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/BF02134016","volume":"5","author":"G Cybenko","year":"1992","unstructured":"Cybenko, G.: Approximation by superpositions of a sigmoidal function. Math. Control Sign. Syst. 5(4), 455 (1992)","journal-title":"Math. Control Sign. Syst."},{"key":"734_CR86","doi-asserted-by":"crossref","unstructured":"Simanjuntak, D.A., Ipung, H.P., Nugroho, A.S., et al.: Text classification techniques used to faciliate cyber terrorism investigation. \u0130n: 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, pp. 198\u2013200 (2010)","DOI":"10.1109\/ACT.2010.40"},{"issue":"1","key":"734_CR87","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41133-020-00032-0","volume":"5","author":"K Shah","year":"2020","unstructured":"Shah, K., Patel, H., Sanghvi, D., Shah, M.: A comparative analysis of logistic regression, random forest and KNN models for the text classification. Augment. Hum. Res. 5(1), 1\u201316 (2020)","journal-title":"Augment. Hum. Res."},{"key":"734_CR88","doi-asserted-by":"publisher","unstructured":"Sun, Y., Li, Y., Zeng, Q., Bian, Y.: Application research of text classification based on random forest algorithm. \u0130n 2020 3rd International conference on advanced electronic materials, computers and software engineering (AEMCSE), pp. 370\u2013374 (2020). https:\/\/doi.org\/10.1109\/AEMCSE50948.2020.00086","DOI":"10.1109\/AEMCSE50948.2020.00086"},{"issue":"11","key":"734_CR89","doi-asserted-by":"publisher","first-page":"519","DOI":"10.3390\/info11110519","volume":"11","author":"S Sawangarreerak","year":"2020","unstructured":"Sawangarreerak, S., Thanathamathee, P.: Random forest with sampling techniques for handling \u0131mbalanced prediction of university student depression. Information 11(11), 519 (2020). https:\/\/doi.org\/10.3390\/info11110519","journal-title":"Information"},{"issue":"4","key":"734_CR90","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.ipm.2009.03.002","volume":"45","author":"M Sokolova","year":"2009","unstructured":"Sokolova, M., Lapalme, G.: A systematic analysis of performance measures for classification tasks. Inf. Process. Manag. 45(4), 427\u2013437 (2009). https:\/\/doi.org\/10.1016\/j.ipm.2009.03.002","journal-title":"Inf. Process. Manag."},{"issue":"6","key":"734_CR91","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1016\/j.ijar.2011.01.007","volume":"52","author":"C Bielza","year":"2011","unstructured":"Bielza, C., Li, G., Larra\u00f1aga, P.: Multi-dimensional classification with Bayesian networks. Int. J. Approx. Reas. 52(6), 705\u2013727 (2011). https:\/\/doi.org\/10.1016\/j.ijar.2011.01.007","journal-title":"Int. J. Approx. Reas."},{"key":"734_CR92","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.chemolab.2017.12.004","volume":"174","author":"D Ballabio","year":"2018","unstructured":"Ballabio, D., Grisoni, F., Todeschini, R.: Multivariate comparison of classification performance measures. Chemom. Intell. Lab. Syst. 174, 33\u201344 (2018). https:\/\/doi.org\/10.1016\/j.chemolab.2017.12.004","journal-title":"Chemom. Intell. Lab. Syst."},{"issue":"2","key":"734_CR93","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0228439","volume":"15","author":"Y Fang","year":"2020","unstructured":"Fang, Y., Liu, Y., Huang, C., Liu, L.: Fastembed: predicting vulnerability exploitation possibility based on ensemble machine learning algorithm. PLoS ONE 15(2), 1\u201328 (2020). https:\/\/doi.org\/10.1371\/journal.pone.0228439","journal-title":"PLoS ONE"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00734-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00734-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00734-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T01:05:31Z","timestamp":1705971931000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00734-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,11]]},"references-count":93,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["734"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00734-7","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,11]]},"assertion":[{"value":"17 July 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}