Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions

Line 130: Line 130:


== 5. Results ==
== 5. Results ==
This section presents the results of our analysis.
=== 5.1. Statistical Results and Predictive Modeling ===
=== 5.2. Comparing the Projects ===


== 6. Limitations ==
== 6. Limitations ==