Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions
Jump to navigation
Jump to search
Programsam (talk | contribs) |
Programsam (talk | contribs) |
||
| Line 44: | Line 44: | ||
(2) | (2) | ||
|-} | |-} | ||
... | |||
== 3. Related Work == | == 3. Related Work == | ||