Research Article

An Automatic Source Code Vulnerability Detection Approach Based on KELM

Figure 2

An example of multilevel symbolization of source code. (a) Sample 0. (b) Level 1 F. (c) Level 2 F + V. (d) Level 3 F + V + T.
(a)
(b)
(c)
(d)