Skip to main content

Table 1 The notations in the similarity model

From: Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities

G

Graphs of vulnerability functions

X

Statements of nodes of \(G\)

\(S_{{G_{1} G_{2} }}\)

Similarity between two functions \(G_{1} , G_{2}\)

W

Embedding matrix of all words in statements

A

Adjacency matrices of graphs G

E

Words embedding matrix of \(X\)

R

The embedding of graphs G

D

Distance between two functions

N

Number of function pairs

L

Contrastive of two functions