Research Article

An Automatic Source Code Vulnerability Detection Approach Based on KELM

Table 9

Efficiency of different symbolization levels on preprocessing.

DatasetSymbolization groupTraining time (s)

BE-ALLF1721.9
F + V1645.5
F + T1674.1
F + V + T1639.3

RM-ALLF930.8
F + V920.8
F + T908.1
F + V + T907.4

HY-ALLF2762.7
F + V2693.6
F + T2692.2
F + V + T2665.2