Research Article
Construction of a Security Vulnerability Identification System Based on Machine Learning
| No. | Keywords | Word frequency | Normalized weight |
| 1 | Postscript | 3 | 1 | 2 | Artifex | 3 | 1 | 3 | Software | 3 | 1 | 4 | Ghostscript | 2 | 0.9354 | 5 | PostScript | 2 | 0.9354 | 6 | Loophole | 2 | 0.8874 | 7 | Open source | 1 | 0.8471 | 8 | United States | 1 | 0.8314 | 9 | Desktop | 1 | 0.8302 | 10 | Program | 1 | 0.825 | 11 | Attacker | 1 | 0.824 | 12 | Safety | 1 | 0.8239 | 13 | Parsing | 1 | 0.8239 | 14 | Table of contents | 1 | 0.8231 | 15 | Access | 1 | 0.8201 | 16 | Page | 1 | 0.8181 |
|
|