Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions
Programsam (talk | contribs) |
Programsam (talk | contribs) No edit summary |
||
| Line 394: | Line 394: | ||
# http://www.cs.waikato.ac.nz/ml/weka/ | # http://www.cs.waikato.ac.nz/ml/weka/ | ||
# With two (N) datasets, a researcher can only make one (N-1) comparison. | # With two (N) datasets, a researcher can only make one (N-1) comparison. | ||
[[Category:Conference Papers]] | |||