Research Article

Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning

Figure 6

Representations of (a) IPSG and (b) DSSG of code from Algorithm 3.
(a)
(b)