共 13 条
- [1] Information security technology security vulnerability identification and description specifications, (2012)
- [2] China national vulnerability database of information security
- [3] Wei S., He T., Hu C., Et al., Predicting software security vulnerabilities with component dependency graphs, Transactions of Beijing Institute of Technology, 38, 5, pp. 525-530, (2018)
- [4] Conneau A., Schwenk H., Barrault L., Et al., Very deep convolutional networks for text classification, Proceedings of the 15 Th Conference of the European Chapter of the Association for Computational Linguisticss, 1, pp. 1107-1116, (2017)
- [5] Du C., Huang L., Sentiment analysis with piecewise convolution neural network, Computer Engineering and Science, 39, 1, pp. 173-179, (2017)
- [6] Li Y.L., An approach towards standardising vulnerability categories, (2007)
- [7] Chen Z.Q., Zhang Y., Chen Z.R., A categorization framework for common vulnerabilities and exposures, The Computer Journal, 53, 5, pp. 551-580, (2010)
- [8] Liao X., Wang Y., Fan X., Et al., National securityvulnerability database classification based on an LDA topic model, Tsinghua Univ(Sci& Tech), 10, pp. 1351-1355, (2012)
- [9] Li Y., Hao Z., Lei H., Survey of convolutional neural network, Journal of Computer Applications, 36, 9, pp. 2508-2515, (2016)
- [10] Chen P., Guo W., Document topic categorization combining latent topic information and convolutional semantic features, Journal of Signal Processing, 33, 8, pp. 1090-1096, (2017)