Research Article
An Automatic Source Code Vulnerability Detection Approach Based on KELM
Table 9
Efficiency of different symbolization levels on preprocessing.
| Dataset | Symbolization group | Training time (s) |
| BE-ALL | F | 1721.9 | F + V | 1645.5 | F + T | 1674.1 | F + V + T | 1639.3 |
| RM-ALL | F | 930.8 | F + V | 920.8 | F + T | 908.1 | F + V + T | 907.4 |
| HY-ALL | F | 2762.7 | F + V | 2693.6 | F + T | 2692.2 | F + V + T | 2665.2 |
|
|