Fig. 2From: Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilitiesOverall architecture of our proposed methodBack to article page