ICST.Table 1: Difference between revisions
Programsam (talk | contribs) No edit summary |
Programsam (talk | contribs) No edit summary |
||
| Line 61: | Line 61: | ||
| colspan=2 | True (Chi-Square, p<0.00001) | | colspan=2 | True (Chi-Square, p<0.00001) | ||
|- | |- | ||
| style="border-style: solid; border-width: 0 1px 1px 0" | *This finding is consistent with the report from SANS (see Section 1) that indicates that the most popular types of web application attacks are input validation vulnerabilities. | | colspan=2 | style="border-style: solid; border-width: 0 1px 1px 0" | *This finding is consistent with the report from SANS (see Section 1) that indicates that the most popular types of web application attacks are input validation vulnerabilities. | ||
† Please note that we use the term "hypothesis" in this table with respect to scientific hypotheses and not statistical hypotheses. | † Please note that we use the term "hypothesis" in this table with respect to scientific hypotheses and not statistical hypotheses. | ||
|} | |} | ||