Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions

No edit summary
 
Line 394: Line 394:
# http://www.cs.waikato.ac.nz/ml/weka/
# http://www.cs.waikato.ac.nz/ml/weka/
# With two (N) datasets, a researcher can only make one (N-1) comparison.
# With two (N) datasets, a researcher can only make one (N-1) comparison.
[[Category:Conference Papers]]