Skip to main content

and
  1. Article

    Open Access

    Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities

    Vulnerability reports are essential for improving software security since they record key information on vulnerabilities. In a report, CWE denotes the weakness of the vulnerability and thus helps quickly under...

    Peng Liu, Wenzhe Ye, Haiying Duan, **anxian Li, Shuyi Zhang, Chuanjian Yao in Cybersecurity (2023)