Research Article

Research on Cross-Company Defect Prediction Method to Improve Software Security

Figure 4

Schematic diagram of clustering-based metric matching. (a) Original datasets, (b) data preprocessing, (c) metric clustering, (d) metric matching, (e) metric arrangement, and (f) final datasets.
(a)
(b)
(c)
(d)
(e)
(f)