Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions

Jump to navigation Jump to search
Line 217: Line 217:
Recall
Recall
|-
|-
| 2.0
| style="background: #eeeeee" | 2.0
| 0.50
| 0.50
| 0.10
| 0.10
Line 223: Line 223:
| 0.10
| 0.10
|-
|-
| 2.1
| style="background: #eeeeee" |  2.1
| 0.38
| 0.38
| 0.13
| 0.13
Line 229: Line 229:
| 0.17
| 0.17
|-
|-
| 2.2
| style="background: #eeeeee" |  2.2
| 0.43
| 0.43
| 0.32
| 0.32
Line 235: Line 235:
| 0.26
| 0.26
|-
|-
| 2.3
| style="background: #eeeeee" |  2.3
| 0.28
| 0.28
| 0.21
| 0.21
Line 241: Line 241:
| 0.17
| 0.17
|-
|-
| 2.5
| style="background: #eeeeee" |  2.5
| 0.19
| 0.19
| 0.18
| 0.18
Line 247: Line 247:
| 0.05
| 0.05
|-
|-
| 2.6
| style="background: #eeeeee" |  2.6
| 0.12
| 0.12
| 0.40
| 0.40
Line 253: Line 253:
| 0.00
| 0.00
|-
|-
| 2.7
| style="background: #eeeeee" |  2.7
| 0.31
| 0.31
| 0.40
| 0.40
Line 259: Line 259:
| 0.07
| 0.07
|-
|-
| 2.8
| style="background: #eeeeee" |  2.8
| 0.02
| 0.02
| 0.17
| 0.17