共 117 条
- [1] Anquanke, The security trend analysis report of CVE vulnerability
- [2] CVE details
- [3] Zhong Hao, Zhang Lu, Xie Tao, Et al., Inferring specifications for resources from natural language API documentation, Automated Software Engineering, 18, 3, pp. 227-261, (2011)
- [4] Tan Lin, Yuan Ding, Krishna G, Et al., iComment: Bugs or bad comments?, Proc of the 21st ACM Symp on Operating Systems Principles (SOSP 2007), pp. 145-158, (2007)
- [5] You Wei, Zong Peiyuan, Chen Kai, Et al., SemFuzz: Semantics-based automatic generation of proof-of-concept exploits, Proc of the 24th ACM SIGSAC Conf on Computer and Communications Security(CCS), pp. 2139-2154, (2017)
- [6] Feng Xuan, LiaoXiaojing, Wang Xiaofeng, Et al., Understanding and securing device vulnerabilities through automated bug report analysis, Proc of the 28th USENIX Security Symp, pp. 887-903, (2019)
- [7] Jia Peiyang, Sun Hongyu, Cao Wanying, Et al., Open source software vulnerability data base overview, Journal of Information Security Research, 7, 6, pp. 566-574, (2021)
- [8] Li Yun, Huang Chenling, Wang Zhongfeng, Et al., Survey of software vulnerability mining methods based on machine learning, Journal of Software, 31, 7, pp. 2040-2061, (2020)
- [9] Kubler S, McDonald R, Nivre J., Dependency parsing, Synthesis Lectures on Human Language Technologies, 1, 1, pp. 1-127, (2009)
- [10] Xu Na, Ma Lin, Wang Li, Et al., Extracting domain knowledge elements of construction safety management: Rule-based approach using chinese natural language processing[J/OL], Journal of Management in Engineering, (2021)