Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions
Programsam (talk | contribs) |
Programsam (talk | contribs) |
||
| Line 42: | Line 42: | ||
[[File:Icst2011-figure2.jpg|200px]] | [[File:Icst2011-figure2.jpg|200px]] | ||
| | | | ||
( | (2) | ||
|-} | |-} | ||