Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions

Line 44: Line 44:
(2)
(2)
|-}
|-}
...


== 3. Related Work ==
== 3. Related Work ==