Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions
Programsam (talk | contribs) |
Programsam (talk | contribs) No edit summary |
||
| (One intermediate revision by the same user not shown) | |||
| Line 287: | Line 287: | ||
|- | |- | ||
| style="background: #eeeeee" | 1.1.6.1 | | style="background: #eeeeee" | 1.1.6.1 | ||
| | | 1.00 | ||
| 0. | | 0.15 | ||
| 0. | | 0.13 | ||
| 0. | | 0.07 | ||
|- | |- | ||
| style="background: #eeeeee" | 1.1.6.2 | | style="background: #eeeeee" | 1.1.6.2 | ||
| | | 1.00 | ||
| 0. | | 0.22 | ||
| 0. | | 0.10 | ||
| 0. | | 0.11 | ||
|- | |- | ||
| style="background: #eeeeee" | 1.1.6.3 | | style="background: #eeeeee" | 1.1.6.3 | ||
| | | 1.00 | ||
| 0. | | 0.09 | ||
| 0. | | 0.08 | ||
| 0. | | 0.11 | ||
|- | |- | ||
| style="background: #eeeeee" | 1.1.6.4 | | style="background: #eeeeee" | 1.1.6.4 | ||
| 0. | | 0.08 | ||
| | | 1.00 | ||
| 0. | | 0.00 | ||
| 0. | | 0.00 | ||
|- | |- | ||
| style="background: #eeeeee" | 1.1.6.5 | | style="background: #eeeeee" | 1.1.6.5 | ||
| 0.04 | | 0.04 | ||
| 0. | | 0.50 | ||
| 0.00 | |||
| 0.00 | |||
|} | |} | ||
| Line 394: | Line 394: | ||
# http://www.cs.waikato.ac.nz/ml/weka/ | # http://www.cs.waikato.ac.nz/ml/weka/ | ||
# With two (N) datasets, a researcher can only make one (N-1) comparison. | # With two (N) datasets, a researcher can only make one (N-1) comparison. | ||
[[Category:Conference Papers]] | |||