Research Article
Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning
Figure 8
Comparison between our method and Joern. (a) Comparison of average confusion matrix. (b) Comparison of average recall, TNR, precision, and .
(a) |
(b) |