Fig. 4From: Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilitiesCode characterization in a slice graphBack to article page