Research Article

Construction of a Security Vulnerability Identification System Based on Machine Learning

Table 2

Word frequency analysis.

No.KeywordsWord frequencyNormalized weight

1Postscript31
2Artifex31
3Software31
4Ghostscript20.9354
5PostScript20.9354
6Loophole20.8874
7Open source10.8471
8United States10.8314
9Desktop10.8302
10Program10.825
11Attacker10.824
12Safety10.8239
13Parsing10.8239
14Table of contents10.8231
15Access10.8201
16Page10.8181