Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions
Jump to navigation
Jump to search
Programsam (talk | contribs) |
Programsam (talk | contribs) |
||
| Line 182: | Line 182: | ||
# CWE-20, CWE-79, CWE-89, CWE-77, CWE-22, CWE-74, CWE-226, CWE-138, CWE-212, CWE-150 | # CWE-20, CWE-79, CWE-89, CWE-77, CWE-22, CWE-74, CWE-226, CWE-138, CWE-212, CWE-150 | ||
# http://www.r-project.org/, Version 2.9.2. | # http://www.r-project.org/, Version 2.9.2. | ||
# http://www.cs.waikato.ac.nz/ml/weka/ | |||
# With two (N) datasets, a researcher can only make one (N-1) comparison. | |||