Detecting recurring and similar software vulnerabilities | IEEE Conference Publication | IEEE Xplore