Research Article
An Automatic Source Code Vulnerability Detection Approach Based on KELM
Table 9
Efficiency of different symbolization levels on preprocessing.
| | Dataset | Symbolization group | Training time (s) |
| | BE-ALL | F | 1721.9 | | F + V | 1645.5 | | F + T | 1674.1 | | F + V + T | 1639.3 |
| | RM-ALL | F | 930.8 | | F + V | 920.8 | | F + T | 908.1 | | F + V + T | 907.4 |
| | HY-ALL | F | 2762.7 | | F + V | 2693.6 | | F + T | 2692.2 | | F + V + T | 2665.2 |
|
|