咨询与建议

限定检索结果

文献类型

  • 39 篇 会议
  • 18 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 58 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 53 篇 工学
    • 42 篇 计算机科学与技术...
    • 27 篇 软件工程
    • 12 篇 电气工程
    • 11 篇 信息与通信工程
    • 4 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 4 篇 理学
    • 4 篇 数学
    • 2 篇 系统科学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 58 篇 secure software ...
  • 11 篇 software securit...
  • 7 篇 security
  • 5 篇 secure software ...
  • 5 篇 privacy
  • 4 篇 threat modeling
  • 4 篇 security methodo...
  • 4 篇 security standar...
  • 4 篇 security pattern...
  • 4 篇 systematic mappi...
  • 3 篇 software enginee...
  • 3 篇 systematics
  • 3 篇 devsecops
  • 3 篇 software
  • 3 篇 distributed syst...
  • 3 篇 security solutio...
  • 2 篇 software assuran...
  • 2 篇 security require...
  • 2 篇 goal-oriented mo...
  • 2 篇 gateways

机构

  • 5 篇 fortiss gmbh mun...
  • 5 篇 blekinge inst te...
  • 5 篇 tech univ munich...
  • 3 篇 univ adelaide sc...
  • 3 篇 florida atlantic...
  • 2 篇 tech univ munich...
  • 2 篇 technol univ dub...
  • 2 篇 siemens ct munic...
  • 2 篇 univ malaga netw...
  • 2 篇 univ e london sc...
  • 2 篇 social engn acad...
  • 2 篇 natl coll irelan...
  • 2 篇 univ malakand de...
  • 2 篇 albaha univ dept...
  • 2 篇 univ toulouse ir...
  • 1 篇 university of mi...
  • 1 篇 qatar univ dept ...
  • 1 篇 univ e london sc...
  • 1 篇 iit 10 west 35th...
  • 1 篇 pontificia univ ...

作者

  • 7 篇 moyon fabiola
  • 6 篇 mendez daniel
  • 5 篇 khan siffat ulla...
  • 5 篇 khan rafiq ahmad
  • 5 篇 beckers kristian
  • 4 篇 islam shareeful
  • 4 篇 juerjens jan
  • 4 篇 ilyas muhammad
  • 3 篇 portillo-domingu...
  • 3 篇 klepper sebastia...
  • 3 篇 ayala-rivera van...
  • 3 篇 uzunov anton v.
  • 3 篇 falkner katrina
  • 3 篇 fernandez eduard...
  • 2 篇 hamid brahim
  • 2 篇 bruel jean-miche...
  • 2 篇 geisel jacob
  • 2 篇 schneider kurt
  • 2 篇 jahn sabrina
  • 2 篇 cruzes daniela s...

语言

  • 55 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"主题词=Secure Software Engineering"
58 条 记 录,以下是1-10 订阅
排序:
Systematic Mapping Study on Security Approaches in secure software engineering
收藏 引用
IEEE ACCESS 2021年 9卷 19139-19160页
作者: Khan, Rafiq Ahmad Khan, Siffat Ullah Khan, Habib Ullah Ilyas, Muhammad Univ Malakand Dept Comp Sci & IT Software Engn Res Grp Chakdara 18800 Pakistan Qatar Univ Dept Accounting & Informat Syst Coll Business & Econ Doha Qatar
In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably ne... 详细信息
来源: 评论
Exploring Security Procedures in secure software engineering: A Systematic Mapping Study  22
Exploring Security Procedures in Secure Software Engineering...
收藏 引用
26th ACM International Conference on Evaluation and Assessment in software engineering, EASE 2022
作者: Khan, Rafiq Ahmad Khan, Siffat Ullah Ilyas, Muhammad Department of Computer Science & IT University of Malakand Pakistan Department of Computer Science Gandhara University Peshawar Pakistan
Various new technologies have developed as software security solutions have become more critical. One of the essential parts of software quality is the product's security. Though providing examples covering all ph... 详细信息
来源: 评论
Work in Progress: Towards an Academic secure software engineering Curriculum for Engineers  11
Work in Progress: Towards an Academic Secure Software Engine...
收藏 引用
IEEE Global engineering Education Conference (IEEE EDUCON)
作者: Jahn, Sabrina Mottok, Juergen Ostbayerisehe Tech Hsch Regensburg Regensburg Germany
In the age of the Internet of Things, it is becoming increasingly important to integrate knowledge about the development of secure systems (secure software engineering) into academic teaching. However, teaching IT Sec... 详细信息
来源: 评论
Applying software Assurance and Cybersecurity NICE Job Tasks through secure software engineering Labs
Applying Software Assurance and Cybersecurity NICE Job Tasks...
收藏 引用
International Conference on ENTERprise Information Systems (CENTERIS) / International Conference on Project MANagement (ProjMAN) / International Conference on Health and Social Care Information Systems and Technologies (HCist)
作者: Dawson, Maurice Taveras, Pedro Taylor, Danielle IIT 10 West 35th St Chicago IL 60616 USA Pontificia Univ Catolica Madre & Maestra Abraham Lincoln Esq Simon Bolivar Santo Domingo 10108 Dominican Rep Univ Missouri 1 Univ Blvd St Louis MO 63131 USA
To meet growing demands in the United States market for cybersecurity professionals, the National Security Agency and Department of Homeland Security have jointly established the National Center for Academic Excellenc... 详细信息
来源: 评论
Applying software Assurance and Cybersecurity NICE Job Tasks through secure software engineering Labs
收藏 引用
Procedia Computer Science 2019年 164卷 301-312页
作者: Maurice Dawson Pedro Taveras Danielle Taylor Illinois Institute of Technology 10 West 35th Street Chicago IL 60616 USA Pontificia Universidad Catolica Madre y Maestra Abraham Lincoln esq. Simón Bolivar Santo Domingo 10108 Dominican Republic University of Missouri - Saint Louis 1 University Blvd St. Louis MO 63131 USA
To meet growing demands in the United States market for cybersecurity professionals, the National Security Agency and Department of Homeland Security have jointly established the National Center for Academic Excellenc... 详细信息
来源: 评论
Exploring How to Apply secure software Design Principles
收藏 引用
IEEE ACCESS 2022年 10卷 128983-128993页
作者: Ebad, Shouki A. Northern Border Univ Fac Sci Dept Comp Sci Ar Ar 91431 Saudi Arabia
secure design principles (SDPs) are employed to be a solution against many types of attacks. However, it has been shown that software designers are not familiar with the notion of SDPs or do not understand how to impl... 详细信息
来源: 评论
Security Assurance Model of software Development for Global software Development Vendors
收藏 引用
IEEE ACCESS 2022年 10卷 58458-58487页
作者: Khan, Rafiq Ahmad Khan, Siffat Ullah Alzahrani, Musaad Ilyas, Muhammad Univ Malakand Dept Comp Sci & IT Software Engn Res Grp Chakdara 18800 Pakistan Albaha Univ Dept Comp Sci Albaha Saudi Arabia
The number of security attacks and the impact has grown considerably in the recent several years. As a result, new emerging software development models are required that assist in developing software that is secure by... 详细信息
来源: 评论
Systematic Literature Review on Security Risks and its Practices in secure software Development
收藏 引用
IEEE ACCESS 2022年 10卷 5456-5481页
作者: Khan, Rafiq Ahmad Khan, Siffat Ullah Khan, Habib Ullah Ilyas, Muhammad Univ Malakand Software Engn Res Grp Dept Comp Sci & IT Chakdara 18800 Pakistan Qatar Univ Coll Business & Econ Dept Accounting & Informat Syst Doha Qatar
Security is one of the most critical aspects of software quality. software security refers to the process of creating and developing software that assures the integrity, confidentiality, and availability of its code, ... 详细信息
来源: 评论
Analysis of Supply Chain Attacks in Open-Source software and Mitigation Strategies  5
Analysis of Supply Chain Attacks in Open-Source Software and...
收藏 引用
5th IEEE International Conference on Communication, Computing and Industry 6.0, C2I6 2024
作者: Merigala, Joseph Kumar, Vivek Gujjarlapudi, Jashuva Gupta, Manas Kumar, Athmakuri Satish K.L University Computer Science and Engineering Andhra Pradesh India
Supply Chain Attacks, particularly those exploiting the extensive implementation of open-source software and libraries have continued to compromise the security of enterprise applications. The exploit discovered in th... 详细信息
来源: 评论
Detection of Phishing in Mobile Instant Messaging using Natural Language Processing and Machine Learning  11
Detection of Phishing in Mobile Instant Messaging using Natu...
收藏 引用
11th International Conference in software engineering Research and Innovation (CONISOFT)
作者: Verma, Suman Ayala-Rivera, Vanessa Portillo-Dominguez, A. Omar Natl Coll Ireland Sch Comp Dublin Ireland Technol Univ Dublin Sch Business Technol Retail & Supply Chain Dublin Ireland
Advancements in mobile technology makes it easier to communicate in real time, but at the cost of having a wider potential attack area for phishing. While there has been research in the field related to Email and SMS,... 详细信息
来源: 评论