{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:52:02Z","timestamp":1759092722273,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,1]]},"DOI":"10.23919\/wac50355.2021.9559470","type":"proceedings-article","created":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:32:30Z","timestamp":1633908750000},"page":"186-192","source":"Crossref","is-referenced-by-count":4,"title":["Identifying characteristics of software vulnerabilities by their textual description using machine learning"],"prefix":"10.23919","author":[{"given":"Konstantin","family":"Izrailov","sequence":"first","affiliation":[]},{"given":"Mikhail","family":"Buinevich","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Yaroshenko","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323939"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2723570"},{"key":"ref32","first-page":"54","article-title":"Applying big data processing and machine learning methods for mobile internet of things security monitoring","volume":"8","author":"kotenko","year":"2018","journal-title":"Journal of Internet Services and Information Security"},{"key":"ref31","first-page":"60","article-title":"Parallel big data processing system for security monitoring in internet of things networks","volume":"8","author":"saenko","year":"2017","journal-title":"Journal of Computer Science and Technology"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IPEC51340.2021.9421098"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT48808.2020.9087528"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2020.9020005"},{"key":"ref35","first-page":"1","article-title":"Early detection of vulnerabilities from news websites using machine learning models","author":"iorga","year":"2020","journal-title":"2020 19th RoEduNet Conference Networking in Education and Research (RoEduNet)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT52173.2021.9435453"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWAMTIP.2018.8632592"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2013.6561863"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IRCE.2018.8492945"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ITAPP.2010.5566113"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI51242.2021.9453071"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSSA48701.2019.8985458"},{"key":"ref16","first-page":"259","article-title":"Sentiment analysis from depression-related user-generated contents from social media","author":"saha","year":"2021","journal-title":"2021 8th International Conference on Computer and Communication Engineering (ICCCE)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/I2CT51068.2021.9418186"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS52457.2021.9464566"},{"key":"ref19","first-page":"1","article-title":"Detecting fake news using machine learning algorithms","author":"bharath","year":"2021","journal-title":"2021 International Conference on Computer Communication and Informatics (ICCCI)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT.2018.8631225"},{"key":"ref4","first-page":"14","article-title":"Evaluation of computer network security based on attack graphs and security event processing","volume":"5","author":"kotenko","year":"2014","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMITCon.2019.8862451"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2017.33"},{"key":"ref6","first-page":"1","article-title":"Threats classification method for the transport infrastructure of a smart city","author":"izrailov","year":"2020","journal-title":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/RUSAUTOCON.2019.8867699"},{"key":"ref5","first-page":"16","article-title":"Method and algorithms of visual audit of program interaction","volume":"11","author":"buinevich","year":"2021","journal-title":"Journal of Internet Services and Information Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2016.7550929"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISECS.2010.9"},{"key":"ref2","first-page":"41","article-title":"Integrated repository of security information for network security evaluation","volume":"6","author":"fedorchenko","year":"2015","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIS49377.2020.9194939"},{"key":"ref1","first-page":"60","article-title":"Design technique for secure embedded devices: Application for creation of integrated cyber-physical security system","volume":"7","author":"desnitsky","year":"2016","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.31854\/1813-324X-2020-6-1-77-85"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC48623.2020.9084733"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/RAINS.2016.7764378"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.15622\/sp.42.12"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSN50589.2020.00126"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IUCS.2010.5666651"},{"key":"ref25","first-page":"243","article-title":"Enhancing tokenization by embedding romanian language specific morphology","author":"vasiu","year":"2020","journal-title":"2020 IEEE 16th International Conference on Intelligent Computer Communication and Processing (ICCP)"}],"event":{"name":"2021 World Automation Congress (WAC)","start":{"date-parts":[[2021,8,1]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2021,8,5]]}},"container-title":["2021 World Automation Congress (WAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9559429\/9559420\/09559470.pdf?arnumber=9559470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T21:10:25Z","timestamp":1639429825000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9559470\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,1]]},"references-count":38,"URL":"https:\/\/doi.org\/10.23919\/wac50355.2021.9559470","relation":{},"subject":[],"published":{"date-parts":[[2021,8,1]]}}}