Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities.
Peng LiuWenzhe YeHaiying DuanXianxian LiShuyi ZhangChuanjian YaoYongnan LiPublished in: Cybersecur. (2023)
Keyphrases
- neural network
- random walk
- graph representation
- graph theoretic
- artificial neural networks
- graph structure
- source code
- back propagation
- connected components
- automatically generated
- genetic algorithm
- attack graph
- network architecture
- weighted graph
- graph theory
- directed graph
- neural nets
- multilayer perceptron
- directed acyclic graph
- graph model
- fault diagnosis
- search space
- bipartite graph
- semi supervised
- security issues
- fuzzy logic