Research Article
An Automatic Source Code Vulnerability Detection Approach Based on KELM
Figure 6
Four samples used to evaluate the effectiveness of the two vector representation methods. (a) Sample 1. (b) Sample 2. (c) Sample 3. (d) Sample 4.
| (a) |
| (b) |
| (c) |
| (d) |