ICST.Table 1: Difference between revisions

No edit summary
No edit summary
Line 61: Line 61:
| colspan=2 | True (Chi-Square, p<0.00001)
| colspan=2 | True (Chi-Square, p<0.00001)
|-
|-
| style="border-style: solid; border-width: 0 1px 1px 0" | *This finding is consistent with the report from SANS (see Section 1) that indicates that the most popular types of web application attacks are input validation vulnerabilities.
| colspan=2 | style="border-style: solid; border-width: 0 1px 1px 0" | *This finding is consistent with the report from SANS (see Section 1) that indicates that the most popular types of web application attacks are input validation vulnerabilities.
† Please note that we use the term "hypothesis" in this table with respect to scientific hypotheses and not statistical hypotheses.
† Please note that we use the term "hypothesis" in this table with respect to scientific hypotheses and not statistical hypotheses.


|}
|}