(PDF) Research on attack cases via topic-model analysis and selection of vulnerability candidates from large-scale vulnerability database