{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:09:34Z","timestamp":1752282574942,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/icinfa.2013.6720316","type":"proceedings-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T17:34:30Z","timestamp":1391189670000},"page":"312-318","source":"Crossref","is-referenced-by-count":20,"title":["Automatic classification for vulnerability based on machine learning"],"prefix":"10.1109","author":[{"given":"Bo","family":"Shuai","sequence":"first","affiliation":[]},{"given":"Haifeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Mengjun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chaojing","family":"Tang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"1979","author":"van rijsbergen","journal-title":"Information Retrieval","key":"19"},{"key":"17","article-title":"On the construction of huffman trees","author":"van leeuwen","year":"1976","journal-title":"Proc 2nd Int Colloquium"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1145\/1961189.1961199"},{"key":"15","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/ICPR.1994.576879","article-title":"Comparisonof classifier methods:A case study inhandwriting digit recognition","author":"bottou","year":"1994","journal-title":"Int Conf Pattern Recognition"},{"key":"16","first-page":"547","article-title":"Large margin DAGs for multiclass classification","volume":"12","author":"platt","year":"2000","journal-title":"Advances in neural information processing systems"},{"key":"13","article-title":"Modeling multi-class support vector machines","author":"weston","year":"1998","journal-title":"Technical Report CSD-TR-98-04 Dept of Computer Science"},{"key":"14","first-page":"255","author":"krebel","year":"1999","journal-title":"Pairwise Classification and Support Vector Machines[M]"},{"year":"2004","author":"grilfiths","journal-title":"Gibbs sampling in the Generative Model of Latent Dirichlet Allocation","key":"11"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1007\/BF00994018"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1016\/j.proeng.2012.01.419"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1016\/j.proeng.2011.08.764"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1016\/j.phpro.2012.05.312"},{"key":"23","article-title":"Ranking and selecting terms for text categorization via SVM discriminate boundary","volume":"25","author":"kuo","year":"2010","journal-title":"Int J Intell Syst"},{"key":"24","article-title":"Comparing SVM and naive bayes classifiers for text categorization with wikitology as knowledge enrichment","author":"hassan","year":"2012","journal-title":"CoRR"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1016\/j.patcog.2012.01.018"},{"key":"26","article-title":"Lda boost classification: Boosting by topics","author":"la","year":"2012","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"27","article-title":"Topics in machine learning for biomedical literature analysis and text retrieval","volume":"3","author":"rezarta","year":"2012","journal-title":"Journal of Biomedical Semantics"},{"key":"28","article-title":"A survey of nai?ve bayes machine learning approach in text document classification","volume":"7","author":"aghila","year":"2010","journal-title":"International Journal of Information and Computer Security"},{"year":"1996","author":"adam","journal-title":"Use of a Taxonomy of Security Faults","key":"3"},{"year":"1978","author":"bisbey ii","journal-title":"Protection Analysis Final Report","key":"2"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1162\/jmlr.2003.3.4-5.993"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.6028\/NBS.IR.76-1041","author":"abbott","year":"1976","journal-title":"Security Analysis and Enhancements of Computer Operating Systems"},{"year":"0","journal-title":"National Vulnerability Database","key":"7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/361219.361220"},{"year":"2007","author":"li","journal-title":"An Approach towards Standardising Vulnerability Categories","key":"5"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1093\/comjnl\/bxp040"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1016\/0306-4573(88)90021-0"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1023\/B:INRT.0000011208.60754.a1"}],"event":{"name":"2013 IEEE International Conference on Information and Automation (ICIA)","start":{"date-parts":[[2013,8,26]]},"location":"Yinchuan, China","end":{"date-parts":[[2013,8,28]]}},"container-title":["2013 IEEE International Conference on Information and Automation (ICIA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6709836\/6720259\/06720316.pdf?arnumber=6720316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T01:52:49Z","timestamp":1565142769000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6720316\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icinfa.2013.6720316","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}