咨询与建议

限定检索结果

文献类型

  • 39 篇 会议
  • 18 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 58 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 53 篇 工学
    • 42 篇 计算机科学与技术...
    • 27 篇 软件工程
    • 12 篇 电气工程
    • 11 篇 信息与通信工程
    • 4 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 4 篇 理学
    • 4 篇 数学
    • 2 篇 系统科学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 58 篇 secure software ...
  • 11 篇 software securit...
  • 7 篇 security
  • 5 篇 secure software ...
  • 5 篇 privacy
  • 4 篇 threat modeling
  • 4 篇 security methodo...
  • 4 篇 security standar...
  • 4 篇 security pattern...
  • 4 篇 systematic mappi...
  • 3 篇 software enginee...
  • 3 篇 systematics
  • 3 篇 devsecops
  • 3 篇 software
  • 3 篇 distributed syst...
  • 3 篇 security solutio...
  • 2 篇 software assuran...
  • 2 篇 security require...
  • 2 篇 goal-oriented mo...
  • 2 篇 gateways

机构

  • 5 篇 fortiss gmbh mun...
  • 5 篇 blekinge inst te...
  • 5 篇 tech univ munich...
  • 3 篇 univ adelaide sc...
  • 3 篇 florida atlantic...
  • 2 篇 tech univ munich...
  • 2 篇 technol univ dub...
  • 2 篇 siemens ct munic...
  • 2 篇 univ malaga netw...
  • 2 篇 univ e london sc...
  • 2 篇 social engn acad...
  • 2 篇 natl coll irelan...
  • 2 篇 univ malakand de...
  • 2 篇 albaha univ dept...
  • 2 篇 univ toulouse ir...
  • 1 篇 university of mi...
  • 1 篇 qatar univ dept ...
  • 1 篇 univ e london sc...
  • 1 篇 iit 10 west 35th...
  • 1 篇 pontificia univ ...

作者

  • 7 篇 moyon fabiola
  • 6 篇 mendez daniel
  • 5 篇 khan siffat ulla...
  • 5 篇 khan rafiq ahmad
  • 5 篇 beckers kristian
  • 4 篇 islam shareeful
  • 4 篇 juerjens jan
  • 4 篇 ilyas muhammad
  • 3 篇 portillo-domingu...
  • 3 篇 klepper sebastia...
  • 3 篇 ayala-rivera van...
  • 3 篇 uzunov anton v.
  • 3 篇 falkner katrina
  • 3 篇 fernandez eduard...
  • 2 篇 hamid brahim
  • 2 篇 bruel jean-miche...
  • 2 篇 geisel jacob
  • 2 篇 schneider kurt
  • 2 篇 jahn sabrina
  • 2 篇 cruzes daniela s...

语言

  • 55 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"主题词=Secure Software Engineering"
58 条 记 录,以下是1-10 订阅
排序:
Systematic Mapping Study on Security Approaches in secure software engineering
收藏 引用
IEEE ACCESS 2021年 9卷 19139-19160页
作者: Khan, Rafiq Ahmad Khan, Siffat Ullah Khan, Habib Ullah Ilyas, Muhammad Univ Malakand Dept Comp Sci & IT Software Engn Res Grp Chakdara 18800 Pakistan Qatar Univ Dept Accounting & Informat Syst Coll Business & Econ Doha Qatar
In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably ne... 详细信息
来源: 评论
A framework to support alignment of secure software engineering with legal regulations
收藏 引用
software AND SYSTEMS MODELING 2011年 第3期10卷 369-394页
作者: Islam, Shareeful Mouratidis, Haralambos Juerjens, Jan Tech Univ Munich Inst Informat Munich Germany Univ E London Sch Comp IT & Engn London E15 4LZ England TU Dortmund Dept Comp Sci Dortmund Germany
Regulation compliance is getting more and more important for software systems that process and manage sensitive information. Therefore, identifying and analysing relevant legal regulations and aligning them with secur... 详细信息
来源: 评论
Applying software Assurance and Cybersecurity NICE Job Tasks through secure software engineering Labs
Applying Software Assurance and Cybersecurity NICE Job Tasks...
收藏 引用
International Conference on ENTERprise Information Systems (CENTERIS) / International Conference on Project MANagement (ProjMAN) / International Conference on Health and Social Care Information Systems and Technologies (HCist)
作者: Dawson, Maurice Taveras, Pedro Taylor, Danielle IIT 10 West 35th St Chicago IL 60616 USA Pontificia Univ Catolica Madre & Maestra Abraham Lincoln Esq Simon Bolivar Santo Domingo 10108 Dominican Rep Univ Missouri 1 Univ Blvd St Louis MO 63131 USA
To meet growing demands in the United States market for cybersecurity professionals, the National Security Agency and Department of Homeland Security have jointly established the National Center for Academic Excellenc... 详细信息
来源: 评论
Work in Progress: Towards an Academic secure software engineering Curriculum for Engineers  11
Work in Progress: Towards an Academic Secure Software Engine...
收藏 引用
IEEE Global engineering Education Conference (IEEE EDUCON)
作者: Jahn, Sabrina Mottok, Juergen Ostbayerisehe Tech Hsch Regensburg Regensburg Germany
In the age of the Internet of Things, it is becoming increasingly important to integrate knowledge about the development of secure systems (secure software engineering) into academic teaching. However, teaching IT Sec... 详细信息
来源: 评论
Exploring Security Procedures in secure software engineering: A Systematic Mapping Study  22
Exploring Security Procedures in Secure Software Engineering...
收藏 引用
26th ACM International Conference on Evaluation and Assessment in software engineering, EASE 2022
作者: Khan, Rafiq Ahmad Khan, Siffat Ullah Ilyas, Muhammad Department of Computer Science & IT University of Malakand Pakistan Department of Computer Science Gandhara University Peshawar Pakistan
Various new technologies have developed as software security solutions have become more critical. One of the essential parts of software quality is the product's security. Though providing examples covering all ph... 详细信息
来源: 评论
secure software engineering teaching modules  06
Secure software engineering teaching modules
收藏 引用
Proceedings of the 3rd annual conference on Information security curriculum development
作者: James Walden Charles E. Frank Northern Kentucky University Highland Heights KY
We are designing a course in secure software engineering that will teach students how to incorporate security throughout the software development lifecycle. The class will serve as a capstone for a new graduate certif... 详细信息
来源: 评论
Applying software Assurance and Cybersecurity NICE Job Tasks through secure software engineering Labs
收藏 引用
Procedia Computer Science 2019年 164卷 301-312页
作者: Maurice Dawson Pedro Taveras Danielle Taylor Illinois Institute of Technology 10 West 35th Street Chicago IL 60616 USA Pontificia Universidad Catolica Madre y Maestra Abraham Lincoln esq. Simón Bolivar Santo Domingo 10108 Dominican Republic University of Missouri - Saint Louis 1 University Blvd St. Louis MO 63131 USA
To meet growing demands in the United States market for cybersecurity professionals, the National Security Agency and Department of Homeland Security have jointly established the National Center for Academic Excellenc... 详细信息
来源: 评论
secure Modules for Undergraduate software engineering Courses  48
Secure Modules for Undergraduate Software Engineering Course...
收藏 引用
48th IEEE Frontiers in Education Conference (FIE)
作者: Yang, Jeong Lodgher, Akhtar Lee, Young Texas A&M Univ Comp & Cyber Secur San Antonio TX 78224 USA
Security affects every software component in different types of computing systems. Many vulnerabilities and attacks on software systems are due to security weaknesses in the software itself. During the process of soft... 详细信息
来源: 评论
An advanced approach for modeling and detecting software vulnerabilities
收藏 引用
INFORMATION AND software TECHNOLOGY 2012年 第9期54卷 997-1013页
作者: Shahmehri, Nahid Mammar, Amel de Oca, Edgardo Montes Byers, David Cavalli, Ana Ardi, Shanai Jimenez, Willy Linkoping Univ Dept Comp & Informat Sci SE-58183 Linkoping Sweden Telecom SudParis F-91011 Evry France Montimage F-75013 Paris France
Context: Passive testing is a technique in which traces collected from the execution of a system under test are examined for evidence of flaws in the system. Objective: In this paper we present a method for detecting ... 详细信息
来源: 评论
I'm all ears! Listening to software developers on putting GDPR principles into software development practice
收藏 引用
PERSONAL AND UBIQUITOUS COMPUTING 2021年 第5期25卷 879-892页
作者: Alhazmi, Abdulrahman Arachchilage, Nalin Asanka Gamagedara La Trobe Univ Sch Engn & Math Sci Melbourne Vic Australia Univ Auckland Sch Comp Sci Auckland New Zealand
Previous research has been carried out to identify the impediments that prevent developers from incorporating privacy protocols into software applications. No research has been carried out to find out why developers a... 详细信息
来源: 评论