Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions

Jump to navigation Jump to search
Line 30: Line 30:


{|-
{|-
|
|[[File:Essos-eqn-1.png|200px]]
[[File:Essos-eqn-1.png|200px]]
|
|
(1)
(1)
|-}
|-
|}


Recall measures the number of vulnerable files the model retrieves, and is defined in Equation 2 where tp is the number of true positives, and fn is the number of false negatives.
Recall measures the number of vulnerable files the model retrieves, and is defined in Equation 2 where tp is the number of true positives, and fn is the number of false negatives.


{|-
{|-
|
|[[File:Icst2011-figure2.jpg|200px]]
[[File:Icst2011-figure2.jpg|200px]]
|
|
(2)
(2)
|-}
|-
|}


...
...