Sign in

Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities.

Peng LiuWenzhe YeHaiying DuanXianxian LiShuyi ZhangChuanjian YaoYongnan Li
Published in: Cybersecur. (2023)
Keyphrases