Skip to main content

Table 14 Time overhead (seconds) upon training the model

From: Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities

Model

2CWE

5CWE

8CWE

SVM

35

72

98

Naïve Bayes

23

57

74

CNN

28

57

76

LSTM

21

45

63

GCN

12

25

64

Our Method

16

54

98