Tracing Vulnerability to Attack Patterns Using Text Similarity | IEEE Conference Publication | IEEE Xplore