共 48 条
[1]
Althebeiti H., 2022, arXiv, DOI [10.48550/arXiv.2210.01260, DOI 10.48550/ARXIV.2210.01260]
[2]
Banerjee S., 2005, P ACL WORKSHOP INTRI, P65, DOI DOI 10.3115/1626355.1626389
[3]
Biswas P, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P183
[5]
Cheng J., 2020, Why socomplicated? Simple term filtering andweighting for location-based bugreport assignment recommendation, P2177, DOI [10.1145/3397271.3401411, DOI 10.1145/3397271.3401411]
[6]
Cheshkov A, 2023, Arxiv, DOI arXiv:2304.07232
[7]
cnnvd, ChinaNational Internet Emergency
[9]
Deng Yinlin, 2024, P IEEEACM 46 INT C S, DOI DOI 10.1145/3597503.3623343
[10]
Evans J., Mitre key details phrasing