Similar vulnerability query based on text mining.
Jin YiRunpu WuJuan LiQi XiongFajiang YuTao PengZhenyu YangBo HanPublished in: ISCIT (2011)
Keyphrases
- text mining
- finding similar
- database
- semantically similar
- response time
- textual documents
- query processing
- natural language processing
- text classification
- query expansion
- similar documents
- relevance feedback
- data structure
- information retrieval
- machine learning
- user defined
- complex queries
- link analysis
- search queries
- retrieval systems
- visually similar
- query formulation
- query execution
- database queries
- query evaluation
- data mining
- cost model
- data objects
- skyline queries
- semi structured
- user queries
- topic models
- biomedical literature
- similarity search
- user interaction
- information extraction
- data sources