Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions
Programsam (talk | contribs) |
Programsam (talk | contribs) |
||
| Line 130: | Line 130: | ||
== 5. Results == | == 5. Results == | ||
This section presents the results of our analysis. | |||
=== 5.1. Statistical Results and Predictive Modeling === | |||
=== 5.2. Comparing the Projects === | |||
== 6. Limitations == | == 6. Limitations == | ||