Fig. 6From: Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilitiesROC curve of our method for different configurationsBack to article page