Research Article

An Automatic Source Code Vulnerability Detection Approach Based on KELM

Figure 6

Four samples used to evaluate the effectiveness of the two vector representation methods. (a) Sample 1. (b) Sample 2. (c) Sample 3. (d) Sample 4.
(a)
(b)
(c)
(d)