Q Li,
W Tang, X Chen, S Feng, L Wang - Applied Intelligence, 2024 - Springer
Extracting valuable information from unstructured vulnerability reports constitutes a
fundamental task in numerous cybersecurity applications. Existing approaches necessitate …