我正试图为我的数据集的列名创建一个向量。我用便笺簿打开了.csv文件。
/app/csrf/;/app/xss/;/http/https_redirect/;/http/vulnerability/apache_expect_xss/;/http/vulnerability/apacheusers/;/http/vulnerability/cgi/;/http/vulnerability/clientaccesspolicy/;/http/vulnerability/content_search/;/http/vulnerability/cookies/;/http/vulnerability/dictionary/;/http/vulnerability/dir_traversal/;/http/vulnerability/docker_registry/;/http/vulnerability/domino/;/http/vulnerability/drupal/;/http/vulnerability/embedded/;/http/vulnerability/headers/;/http/vulnerability/httpoptions/;/http/vulnerability/ms10_070/;/http/vulnerability/multiple_index/;/http/vulnerability/negotiate/;/http/vulnerability/origin_reflection/;/http/vulnerability/outdated/;/http/vulnerability/put_del_test/;/http/vulnerability/shellshock/;/http/vulnerability/siebel/;/http/vulnerability/site_files/;/http/vulnerability/strutshock/;/malware/google/;/rdp/enumeration/;/smtp/open_relay/domain/;/ssh/auth_methods/;/ssl/cert/;/ssl/ciphers/;/ssl/mixed/;/tcp/timestamp/
将所有列复制到word。在此之后,我将所有;符号转换为“,”符号组。
“/app/csrf/”、“/app/xss/”、“/http/https_redirect/”、“/http/漏洞/apache_expect_xss/”、“/http/漏洞/apacheuser/”、“/http/漏洞/cgi/”、“/http/漏洞/clientaccesspolicy/”、“/http/脆弱性/内容_搜索/cookie”、“/http/漏洞/”、“/http/漏洞/字典/”,“/http/multiple/drupal/drupal/”、“/http/multiple/embedded/”、“/http/multiple/headers/”、“/http/multiple/httpoptions/”、“/http/multiple/ms10 10_070/”、“/http/multiple/multiple_index/”、“/http/multiple/drupal/”、“/http/multiple/drupal/”、“/http/vulnerability/test/”、“/http/malware/site/reflection/”、“/http/malware/origin/过时”、“http/malware/put/put_test/”、“http/malware/malware/siebel休克/”、“/http/malware/siebel/”、“http/malware/site_files/”、“http/malware/site_files/”、“/http/malware/site/”、“/恶意软件/google/”、“/rdp/枚举/”,“/smtp/open_中继/domain/”、“/ssh/auth_method/”、“/ssl/cert/”、“/ssl/ciphers/”、“/ssl/mixed/”、“/tcp/时间戳/”
上一次我把这列复制到R
namelist <- c(“/app/csrf/” , “/app/xss/” , “/http/https_redirect/” , “/http/vulnerability/apache_expect_xss/” , “/http/vulnerability/apacheusers/” , “/http/vulnerability/cgi/” , “/http/vulnerability/clientaccesspolicy/” , “/http/vulnerability/content_search/” , “/http/vulnerability/cookies/” , “/http/vulnerability/dictionary/” , “/http/vulnerability/dir_traversal/” , “/http/vulnerability/docker_registry/” , “/http/vulnerability/domino/” , “/http/vulnerability/drupal/” , “/http/vulnerability/embedded/” , “/http/vulnerability/headers/” , “/http/vulnerability/httpoptions/” , “/http/vulnerability/ms10_070/” , “/http/vulnerability/multiple_index/” , “/http/vulnerability/negotiate/” , “/http/vulnerability/origin_reflection/” , “/http/vulnerability/outdated/” , “/http/vulnerability/put_del_test/” , “/http/vulnerability/shellshock/” , “/http/vulnerability/siebel/” , “/http/vulnerability/site_files/” , “/http/vulnerability/strutshock/” , “/malware/google/” , “/rdp/enumeration/” , “/smtp/open_relay/domain/” , “/ssh/auth_methods/” , “/ssl/cert/” , “/ssl/ciphers/” , “/ssl/mixed/” , “/tcp/timestamp/”)但是R不理解这个符号,给了我意想不到的标记错误。为什么?
发布于 2020-02-22 23:06:50
这是因为Word使用的是卷引号,而不是普通的双引号。R不明白这些。尝试将下面的行复制并粘贴到R控制台(但不要运行)
writeClipboard(gsub("”|“", "\"", readClipboard()))现在转到Word,选择并复制文本,返回R并点击return。正确的字符串现在在您的剪贴板上。
发布于 2020-02-23 02:58:30
您可以很容易地跳过所有这些步骤。您的数据文件可能是一个没有列标题的CSV文件。列标题位于另一个文件中,用分号分隔.
可以使用read.csv将CSV数据文件导入R中,使用使用col.names函数指定的col.names参数读取包含列标题的文件:
read.csv("data.csv", header=FALSE, col.names=scan("header.txt", what="character", sep=";"))https://stackoverflow.com/questions/60357588
复制相似问题