From Attack Descriptions to Vulnerabilities: A Sentence Transformer-Based Approach

Open in new window