咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 6 篇 计算机科学与技术...
    • 5 篇 软件工程
    • 3 篇 信息与通信工程
    • 2 篇 电气工程
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 理学
    • 1 篇 数学

主题

  • 9 篇 defensive progra...
  • 3 篇 cybersecurity
  • 1 篇 design-by-contra...
  • 1 篇 cybersecurity ed...
  • 1 篇 model-eliciting ...
  • 1 篇 cipher
  • 1 篇 error confinemen...
  • 1 篇 mea
  • 1 篇 embedded correct...
  • 1 篇 programming
  • 1 篇 software impleme...
  • 1 篇 memory managemen...
  • 1 篇 garbage collecti...
  • 1 篇 smart pointers
  • 1 篇 software enginee...
  • 1 篇 operations
  • 1 篇 software archite...
  • 1 篇 education
  • 1 篇 deployment
  • 1 篇 java

机构

  • 1 篇 wake forest univ...
  • 1 篇 matra marconi sp...
  • 1 篇 cnr isti pisa
  • 1 篇 univ cagliari ca...
  • 1 篇 athens univ econ...
  • 1 篇 fdn res & techno...
  • 1 篇 microsoft res ny...
  • 1 篇 gran sasso sci i...
  • 1 篇 harvard univ cam...
  • 1 篇 texas a&m univ d...
  • 1 篇 texas a&m univ d...
  • 1 篇 university of fl...
  • 1 篇 yeditepe univ de...
  • 1 篇 fdn res & techno...

作者

  • 2 篇 savidis a
  • 1 篇 chane j.f.
  • 1 篇 giacinto giorgio
  • 1 篇 bertoli antonia
  • 1 篇 greca renan
  • 1 篇 yang jeong
  • 1 篇 rossi maria tere...
  • 1 篇 spinellis diomid...
  • 1 篇 han xueyuan
  • 1 篇 earwood brandon
  • 1 篇 planche t.
  • 1 篇 ozkaya mert
  • 1 篇 mickens james
  • 1 篇 iovino ludovico
  • 1 篇 sen siddhartha
  • 1 篇 david p.
  • 1 篇 correge a.
  • 1 篇 kim young rae
  • 1 篇 cheryl resch

语言

  • 9 篇 英文
检索条件"主题词=Defensive Programming"
9 条 记 录,以下是1-10 订阅
排序:
defensive programming for Smart Home Cybersecurity  5
Defensive Programming for Smart Home Cybersecurity
收藏 引用
5th IEEE European Symposium on Security and Privacy (IEEE Euro S and P)
作者: Rossi, Maria Teresa Greca, Renan Iovino, Ludovico Giacinto, Giorgio Bertoli, Antonia Gran Sasso Sci Inst Laquila Italy CNR ISTI Pisa Italy Univ Cagliari Cagliari Italy
Cybersecurity has become a real issue in the development of smart services in the smart home domain, which is formed by a System of Systems where several smart objects are connected to each other and to the Internet. ... 详细信息
来源: 评论
The implementation of generic smart pointers for advanced defensive programming
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2004年 第10期34卷 977-1009页
作者: Savidis, A Fdn Res & Technol Hellas Inst Comp Sci GR-71110 Iraklion Greece
Smart pointers denote a well-known technique for collective resource ownership, e.g. sharing dynamic object instances, while usually supporting automatic garbage collection based on reference counting. The original me... 详细信息
来源: 评论
Application invariants: Design by Contract augmented with deployment correctness logic
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2006年 第3期36卷 255-282页
作者: Savidis, A Fdn Res & Technol Hellas Inst Comp Sci GR-71110 Iraklion Crete Greece
Design by Contract is a method for the development of robust object-oriented software, introducing class invariants as conditions corresponding to the design axioms that should be satisfied by every valid instance of ... 详细信息
来源: 评论
TOOLS OF THE TRADE First, Do No Harm
收藏 引用
IEEE SOFTWARE 2014年 第5期31卷 12-14页
作者: Spinellis, Diomidis Athens Univ Econ & Business Dept Management Sci & Technol Athens Greece
When we maintain existing code, we must be very careful to avoid breaking or degrading the system we're working on. During development, we can minimize problems through reviews, adherence to style rules, defensive... 详细信息
来源: 评论
SPLICE: Efficiently Removing a User's Data from In-memory Application State  23
SPLICE: Efficiently Removing a User's Data from In-memory Ap...
收藏 引用
30th ACM SIGSAC Conference on Computer and Communications Security (ACM CCS)
作者: Han, Xueyuan Mickens, James Sen, Siddhartha Wake Forest Univ Winston Salem NC 27101 USA Harvard Univ Cambridge MA 02138 USA Microsoft Res New York NY USA
SPLICE is a new programming framework that allows security-conscious applications to efficiently locate and delete a user's in-memory state. The core technical challenge is determining how to delete a user's m... 详细信息
来源: 评论
Effective Learning of Cybersecurity Concepts with Model- Eliciting Activities
Effective Learning of Cybersecurity Concepts with Model- Eli...
收藏 引用
IEEE International Conference on Engineering, Technology and Education (IEEE TALE)
作者: Earwood, Brandon Yang, Jeong Kim, Young Rae Texas A&M Univ Dept Comp & Cyber Secur San Antonio TX 78224 USA Texas A&M Univ Dept Curriculum & Instruct San Antonio TX USA
As security is a crucial aspect in the process of developing software systems, software engineers must have a strong understanding of security concepts for an application being developed and tested. There has been a g... 详细信息
来源: 评论
Teaching Design-by-Contract for the Modeling and Implementation of Software Systems  14
Teaching Design-by-Contract for the Modeling and Implementat...
收藏 引用
14th International Conference on Software Technologies (ICSOFT)
作者: Ozkaya, Mert Yeditepe Univ Dept Comp Engn Istanbul Turkey
defensive programming is considered as a software design approach that promotes the reliable software development via the considerations of different cases for the software modules. Design-by-Contract (DbC) applies de... 详细信息
来源: 评论
Developing fault tolerant software in ada for real-time dependable systems  2nd
Developing fault tolerant software in ada for real-time depe...
收藏 引用
2nd International Eurospace-Ada-Europe Symposium, Ada in Europe 1995
作者: David, P. Planche, T. Correge, A. Chane, J.F. Matra Marconi Space Toulouse France
来源: 评论
Creating defensive Programmers : Evaluating the Impact of Adding Cybesecurity Topics to Core Computer Science Courses  23
Creating Defensive Programmers : Evaluating the Impact of Ad...
收藏 引用
Proceedings of the 2023 ACM Conference on International Computing Education Research - Volume 2
作者: Cheryl Resch University of Florida United States of America
The research described in this summary explores whether adding defensive programming topics to the Computer Science (CS) curriculum produces graduates who understand and appreciate the risks associated with software v... 详细信息
来源: 评论