Return to Article Details Extended Vulnerability Feature Extraction Based on Public Resources Download Download PDF