Similar vulnerability query based on text mining | IEEE Conference Publication | IEEE Xplore