Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions

Jump to navigation Jump to search
Line 32: Line 32:
|
|
[[File:Essos-eqn-1.png|200px]]
[[File:Essos-eqn-1.png|200px]]
|
(1)
|-}
Recall measures the number of vulnerable files the model retrieves, and is defined in Equation 2 where tp is the number of true positives, and fn is the number of false negatives.
{|-
|
[[File:Icst2011-figure2.jpg|200px]]
|
|
(1)
(1)