Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions

Line 44: Line 44:
|-
|-
|}
|}
...


== 3. Related Work ==
== 3. Related Work ==