Research Article

A Software Vulnerability Detection Method Based on Complex Network Community

Figure 1

Flowchart of finding the central node set algorithm.