Measuring Similarity for Security Vulnerabilities | IEEE Conference Publication | IEEE Xplore