Research Article

An Automatic Source Code Vulnerability Detection Approach Based on KELM

Table 5

Efficiency of different neural network models on vulnerability detection.

PatternTraining code gadgetsDetection code gadgetsTraining time (s)Detection time (s)

 + B487441289436372.2156.2
d + B49310123281543.53.0
d + E4931012328128.72.7
d + Ada-E49310123282914.07.8
d + KE4931012328335.411.0