Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions
Programsam (talk | contribs) |
Programsam (talk | contribs) |
||
| Line 44: | Line 44: | ||
|- | |- | ||
|} | |} | ||
== 3. Related Work == | == 3. Related Work == | ||