Vulnerability Clustering and other Machine Learning Applications of Semantic Vulnerability Embeddings. Stehr, M. & Kim, M. CoRR, 2023.
Link
Paper bibtex @article{journals/corr/abs-2310-05935,
added-at = {2025-01-02T00:00:00.000+0100},
author = {Stehr, Mark-Oliver and Kim, Minyoung},
biburl = {https://www.bibsonomy.org/bibtex/2426fc2d676880f319afb566e6ff78239/dblp},
ee = {https://doi.org/10.48550/arXiv.2310.05935},
interhash = {71f6e38724ccebdce258efe55919f54f},
intrahash = {426fc2d676880f319afb566e6ff78239},
journal = {CoRR},
keywords = {dblp},
timestamp = {2025-01-06T07:04:34.000+0100},
title = {Vulnerability Clustering and other Machine Learning Applications of Semantic Vulnerability Embeddings.},
url = {http://dblp.uni-trier.de/db/journals/corr/corr2310.html#abs-2310-05935},
volume = {abs/2310.05935},
year = 2023
}
Downloads: 0
{"_id":"TZGw9m5NcNLdq9FDB","bibbaseid":"stehr-kim-vulnerabilityclusteringandothermachinelearningapplicationsofsemanticvulnerabilityembeddings-2023","author_short":["Stehr, M.","Kim, M."],"bibdata":{"bibtype":"article","type":"article","added-at":"2025-01-02T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Stehr"],"firstnames":["Mark-Oliver"],"suffixes":[]},{"propositions":[],"lastnames":["Kim"],"firstnames":["Minyoung"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2426fc2d676880f319afb566e6ff78239/dblp","ee":"https://doi.org/10.48550/arXiv.2310.05935","interhash":"71f6e38724ccebdce258efe55919f54f","intrahash":"426fc2d676880f319afb566e6ff78239","journal":"CoRR","keywords":"dblp","timestamp":"2025-01-06T07:04:34.000+0100","title":"Vulnerability Clustering and other Machine Learning Applications of Semantic Vulnerability Embeddings.","url":"http://dblp.uni-trier.de/db/journals/corr/corr2310.html#abs-2310-05935","volume":"abs/2310.05935","year":"2023","bibtex":"@article{journals/corr/abs-2310-05935,\n added-at = {2025-01-02T00:00:00.000+0100},\n author = {Stehr, Mark-Oliver and Kim, Minyoung},\n biburl = {https://www.bibsonomy.org/bibtex/2426fc2d676880f319afb566e6ff78239/dblp},\n ee = {https://doi.org/10.48550/arXiv.2310.05935},\n interhash = {71f6e38724ccebdce258efe55919f54f},\n intrahash = {426fc2d676880f319afb566e6ff78239},\n journal = {CoRR},\n keywords = {dblp},\n timestamp = {2025-01-06T07:04:34.000+0100},\n title = {Vulnerability Clustering and other Machine Learning Applications of Semantic Vulnerability Embeddings.},\n url = {http://dblp.uni-trier.de/db/journals/corr/corr2310.html#abs-2310-05935},\n volume = {abs/2310.05935},\n year = 2023\n}\n\n","author_short":["Stehr, M.","Kim, M."],"key":"journals/corr/abs-2310-05935","id":"journals/corr/abs-2310-05935","bibbaseid":"stehr-kim-vulnerabilityclusteringandothermachinelearningapplicationsofsemanticvulnerabilityembeddings-2023","role":"author","urls":{"Link":"https://doi.org/10.48550/arXiv.2310.05935","Paper":"http://dblp.uni-trier.de/db/journals/corr/corr2310.html#abs-2310-05935"},"keyword":["dblp"],"metadata":{"authorlinks":{}},"downloads":0,"html":""},"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/Kim?items=1000","dataSources":["gK9RLP8dFNtZRgmvG"],"keywords":["dblp"],"search_terms":["vulnerability","clustering","machine","learning","applications","semantic","vulnerability","embeddings","stehr","kim"],"title":"Vulnerability Clustering and other Machine Learning Applications of Semantic Vulnerability Embeddings.","year":2023}