Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
Well done!
You have completed (UPI) Chapter 12: Threat Detection and Defense Techniques!
You have completed (UPI) Chapter 12: Threat Detection and Defense Techniques!
Instruction
12.2.3. Related Work
In this section, we review the main and recent studies about the combination of different types of web applications security analysis tools with the main objectives of discovering more vulnerabilities and reducing the number of false positives. Several works combine static analysis tools with machine learning techniques for automatic detection of security vulnerabilities in web applications, re...