Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions
Jump to navigation
Jump to search
Programsam (talk | contribs) |
Programsam (talk | contribs) |
||
| Line 32: | Line 32: | ||
| | | | ||
[[File:Essos-eqn-1.png|200px]] | [[File:Essos-eqn-1.png|200px]] | ||
| | |||
(1) | |||
|-} | |||
Recall measures the number of vulnerable files the model retrieves, and is defined in Equation 2 where tp is the number of true positives, and fn is the number of false negatives. | |||
{|- | |||
| | |||
[[File:Icst2011-figure2.jpg|200px]] | |||
| | | | ||
(1) | (1) | ||