Fig. 3From: Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilitiesCode characterization with graphsBack to article page