[1]BAZAA A, ARTHUR J D. Towards a taxonomy of vulnerabilities[C]// Proceedings of the 40th Annual Hawaii International Conference on System Sciences. Piscataway: IEEE Press, 2007:163a-173a.
[2]TUPPER M. A comparison of word frequency and n-gram based vulnerability categorization using SOM[EB/OL].[2014-01-12]. http://web.cs.dal.ca/~tupper/CDMP2008.pdf.
[3]CHEN Z, ZHANG Y, CHEN Z. A categorization framework for common computer vulnerabilities and exposures [J]. The Computer Journal, 2010,53(5):551-580.
[4]MA C, GAO L, SUN Q, et al. Assessment of vulnerability threat based on fuzzy theory[J]. Application Research of Computers, 2014,31(3):815-818,824.(马驰,高岭,孙骞,等.基于模糊理论的漏洞危害等级评估[J].计算机应用研究,2014,31(3):815-818,824.)
[5]CHEN G, LIU Z. Text classification based on maximum entropy and feature aggregation[J]. Computer Applications and Software, 2008, 25(3): 263-267,277.(陈光,刘宗田.基于特征聚合与最大熵的文本分类算法[J].计算机应用与软件,2008,25(3):263-267,277.)
[6]XIE J, ZHANG B, WANG W. A partial binary tree algorithm for multi-class classification based on twin support vector machines [J]. Journal of Nanjing University: Natural Science, 2011,47(4):354-363.(谢娟英,张兵权,汪万紫.基于双支持向量机的偏二叉树多类分类算法[J].南京大学学报:自然科学版,2011,47(4):354-363.)
[7]GULINAZI, SUN T. The application of multi-class SVM based binary tree in Web text categorization[J]. Journal of Xinjiang University: Natural Science, 2011,28(1):100-104.(古丽娜孜,孙铁利.基于二叉树的多类SVM在Web文本分类中的应用研究[J].新疆大学学报:自然科学版,2011,28(1):100-104.)
[8]LONG J, WANG Y, LIU G. Research on text classification based on binary tree multi-class support vector machines [J]. Computer Systems and Applications, 2009,18(5):65-68.(龙军,王易,刘高篙.基于二叉树多类支持向量机的文本分类研究[J].计算机系统应用,2009,18(5):65-68.)
[9]LI R, LI A, CAI Y, et al. Euclidean distance based method unclassifiable region of support vector machine [J]. Journal of Computer Applications, 2010,30(2):476-478,546.(李仁兵,李艾华,蔡艳平,等.基于欧氏距离的支持向量机拒识区域解决方案[J].计算机应用,2010,30(2): 476-478,546.)
[10]SCHOLKOPF B, BURGES C, VAPNIK V. Extracting support data for a given task [C]// Proceedings of the First International Conference on Knowledge Discovery and Data mining. Madison: AAAI Press,1995:252-257.
[11]LIU J, LIU Z, XIONG Y. Improved multi-category support vector machines base on binary tree[J]. Computer Engineering and Applications,2010,46(33):117-120.(刘健,刘忠,熊鹰.改进的二叉树支持向量机多类分类算法研究[J].计算机工程与应用, 2010,46(33):117-120.)
[12]GAO Y. Design and realization on security vulnerability database[J]. Microelectronics and Computer, 2004,24(3):99-101.(高寅生.安全漏洞库设计与研究实现[J].微电子学与计算机,2004,24(3):99-101.)
[13]WANG G, XIA Y. A study on the classification of computer security vulnerability [J]. Computer Security, 2008(11):68-72.(汪贵生,夏阳.计算机安全漏洞分类研究[J].计算机安全,2008(11):68-72.) |