Research Article

A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code

Figure 5

The structure of the individual network.