Research Article

Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning

Figure 7

Comparison between our method and BOMiner. (a) Comparison of average confusion matrix. (b) Comparison of average recall, TNR, precision, and .
(a)
(b)