共 14 条
[1]
[Anonymous], 2011, International Conference on Database and Expert Systems Applications
[2]
Bozorgi M., 2010, 16 ACM SIGKDD INT C, P105, DOI DOI 10.1145/1835804.1835821
[3]
Chollet F., 2015, Keras
[4]
Gawron M, 2017, INT CONF INFORM COMM, P322, DOI 10.1109/IACS.2017.7921992
[5]
Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description
[J].
2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME),
2017,
:125-136
[7]
Pedregosa F, 2011, J MACH LEARN RES, V12, P2825
[8]
Porter MF, 2006, PROGRAM-ELECTRON LIB, V40, P211, DOI [10.1108/00330330610681286, 10.1108/eb046814]
[9]
Rehman S., 2012, INT J COMPUTER SCI S, V6, P238