Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions

Line 42: Line 42:
[[File:Icst2011-figure2.jpg|200px]]
[[File:Icst2011-figure2.jpg|200px]]
|
|
(1)
(2)
|-}
|-}