Research Article
An Automatic Source Code Vulnerability Detection Approach Based on KELM
Figure 6
Four samples used to evaluate the effectiveness of the two vector representation methods. (a) Sample 1. (b) Sample 2. (c) Sample 3. (d) Sample 4.
(a) |
(b) |
(c) |
(d) |