Research Article
A Software Vulnerability Detection Method Based on Complex Network Community
Table 1
The experimental result of the algorithm when the threshold is 0.3.
| Dataset | Algorithm | P | R | F |
| Karate | R Algorithm | 0.910 | 0.562 | 0.695 | Karate | Partition algorithm | 0.915 | 0.856 | 0.885 | Dolphins | R Algorithm | 0.958 | 0.291 | 0.446 | Dolphins | Partition algorithm | 0.946 | 0.525 | 0.675 |
|
|