Fig. 5From: Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilitiesSimilarity calculation with deep neural networksBack to article page