Research Article

An Automatic Source Code Vulnerability Detection Approach Based on KELM

Table 1

Multilevel symbolization.

Symbolization levelSymbolization group

Level 1F
Level 2F + V; F + T
Level 3F + V + T