User contributions for Programsam
Results for Programsam talk block log uploads logs
A user with 807 edits. Account created on 5 February 2013.
24 August 2013
- 22:3722:37, 24 August 2013 diff hist +187 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →5. Results
- 22:3422:34, 24 August 2013 diff hist +2,733 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →4. Methodology
- 22:3422:34, 24 August 2013 diff hist −2,731 ICST.Table 1 Blanked the page current
- 22:3422:34, 24 August 2013 diff hist +11 ICST.Table 1 No edit summary
- 22:3422:34, 24 August 2013 diff hist +21 ICST.Table 1 No edit summary
- 22:3322:33, 24 August 2013 diff hist +12 ICST.Table 1 No edit summary
- 22:3222:32, 24 August 2013 diff hist −2 ICST.Table 1 No edit summary
- 22:3222:32, 24 August 2013 diff hist +12 ICST.Table 1 No edit summary
- 22:3122:31, 24 August 2013 diff hist +375 ICST.Table 1 No edit summary
- 22:2922:29, 24 August 2013 diff hist +300 ICST.Table 1 No edit summary
- 22:2822:28, 24 August 2013 diff hist +667 ICST.Table 1 No edit summary
- 22:2622:26, 24 August 2013 diff hist +271 ICST.Table 1 No edit summary
- 22:2522:25, 24 August 2013 diff hist +374 ICST.Table 1 No edit summary
- 22:2522:25, 24 August 2013 diff hist +225 ICST.Table 1 No edit summary
- 22:2422:24, 24 August 2013 diff hist +23 ICST.Table 1 No edit summary
- 22:2322:23, 24 August 2013 diff hist +48 ICST.Table 1 No edit summary
- 22:2222:22, 24 August 2013 diff hist −3 ICST.Table 1 No edit summary
- 22:2122:21, 24 August 2013 diff hist +60 ICST.Table 1 No edit summary
- 22:2122:21, 24 August 2013 diff hist +273 ICST.Table 1 No edit summary
- 22:1822:18, 24 August 2013 diff hist +64 N ICST.Table 1 Created page with "{| ! ! WordPress ! WikkaWiki |- |Releases Analysed |Nine |Six |}"
- 22:1422:14, 24 August 2013 diff hist +487 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →8. Acknowledgements
- 22:1422:14, 24 August 2013 diff hist +1,403 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →7. Conclusion
- 22:1322:13, 24 August 2013 diff hist +1,415 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →6. Limitations
- 22:1322:13, 24 August 2013 diff hist +3,050 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →5.2. Comparing the Projects
- 22:1122:11, 24 August 2013 diff hist +2,581 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →5.1. Statistical Results and Predictive Modeling
- 22:1022:10, 24 August 2013 diff hist +147 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →5. Results
- 22:0922:09, 24 August 2013 diff hist −5 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →2. Background
- 02:5702:57, 24 August 2013 diff hist +1,574 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →4.7. Predictive Modeling
- 02:5602:56, 24 August 2013 diff hist +113 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →10. End Notes
- 02:5602:56, 24 August 2013 diff hist +1,264 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →4.6. Statistical Analysis
- 02:5502:55, 24 August 2013 diff hist +44 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →10. End Notes
- 02:5502:55, 24 August 2013 diff hist +1,999 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →4.4. Classifying Vulnerabilities
- 02:5202:52, 24 August 2013 diff hist +85 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →10. End Notes
- 02:5202:52, 24 August 2013 diff hist +879 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →4.4. Classifying Vulnerabilities
- 02:5002:50, 24 August 2013 diff hist +12 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →4.3. Mapping Vulnerabilities to Files
- 02:5002:50, 24 August 2013 diff hist +130 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →10. End Notes
- 02:4902:49, 24 August 2013 diff hist +2,362 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →4.4. Classifying Vulnerabilities
- 02:4702:47, 24 August 2013 diff hist +1 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →4.2 Identifying Hotspots
- 02:4602:46, 24 August 2013 diff hist −1 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →4.1 Selecting the Study Subjects
- 02:4402:44, 24 August 2013 diff hist +2 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →2. Background
- 02:4102:41, 24 August 2013 diff hist +5 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →2. Background
- 02:3802:38, 24 August 2013 diff hist +1,621 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →4.3. Mapping Vulnerabilities to Files
- 02:3602:36, 24 August 2013 diff hist +1,917 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →Mapping Vulnerabilities to Files
- 02:3502:35, 24 August 2013 diff hist +1,976 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →4.2 Identifying Hotspots
- 02:3302:33, 24 August 2013 diff hist +34 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →4.1 Selecting the Study Subjects
- 02:3302:33, 24 August 2013 diff hist −1 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →4.1 Selecting the Study Subjects
- 02:3202:32, 24 August 2013 diff hist +34 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →10. End Notes
- 02:3202:32, 24 August 2013 diff hist +715 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →4.1 Selecting the Study Subjects
- 02:3102:31, 24 August 2013 diff hist +82 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →10. End Notes
- 02:3002:30, 24 August 2013 diff hist +12 Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities →4.1 Selecting the Study Subjects