咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=Secure coding"
89 条 记 录,以下是1-10 订阅
排序:
May the Source Be with You: On ChatGPT, Cybersecurity, and secure coding
收藏 引用
INFORMATION 2024年 第9期15卷 572页
作者: Gasiba, Tiago Espinha Iosif, Andrei-Cristian Kessba, Ibrahim Amburi, Sathwik Lechner, Ulrike Pinto-Albuquerque, Maria Siemens AG D-81739 Munich Germany Univ Bundeswehr Munchen Inst Schutz & Zuverlassigkeit Wirtschaftsinformat D-85579 Munich Germany Tech Univ Munich TUM Sch Computat Informat & Technol D-85748 Munich Germany ISTAR Inst Univ Lisboa ISCTE IUL P-1600189 Lisbon Portugal
Software security is an important topic that is gaining more and more attention due to the rising number of publicly known cybersecurity incidents. Previous research has shown that one way to address software security... 详细信息
来源: 评论
Using Real-world Bug Bounty Programs in secure coding Course: Experience Report  29
Using Real-world Bug Bounty Programs in Secure Coding Course...
收藏 引用
29th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE)
作者: Malinka, Kamil Firc, Anton Loutocky, Pavel Vostoupal, Jakub Kristofik, Andrej Kasl, Frantisek Brno Univ Technol Brno Czech Republic Masaryk Univ Brno Czech Republic
To keep up with the growing number of cyber-attacks and associated threats, there is an ever-increasing demand for cybersecurity professionals and new methods and technologies. Training new cybersecurity professionals... 详细信息
来源: 评论
Supporting secure coding for Erlang  24
Supporting Secure Coding for Erlang
收藏 引用
39th Annual ACM Symposium on Applied Computing (SAC)
作者: Toth, Melinda Bozo, Istvan Eotvos Lorand Univ Fac Informat Budapest Hungary
Software developer/operator companies have to face growing cyber threats. secure coding is a development process resulting in software products that resist cyber-attacks. Although several security standards and guidel... 详细信息
来源: 评论
Measuring secure coding Practice and Culture: A Finger Pointing at the Moon is not the Moon  23
Measuring Secure Coding Practice and Culture: A Finger Point...
收藏 引用
45th IEEE/ACM International Conference on Software Engineering (ICSE)
作者: Ryan, Ita Roedig, Utz Stol, Klaas-Jan Univ Coll Cork Sch Comp Sci & IT Adv Ctr Res Trainin Cork Ireland Univ Coll Cork Sch Comp Sci & IT Connect Res Ctr Cork Ireland Univ Coll Cork Sch Comp Sci & IT Lero SFI Res Ctr Software Cork Ireland
Software security research has a core problem: it is impossible to prove the security of complex software. A low number of known defects may simply indicate that the software has not been attacked yet, or that success... 详细信息
来源: 评论
Towards Developer-Centered secure coding Training  38
Towards Developer-Centered Secure Coding Training
收藏 引用
38th IEEE/ACM International Conference on Automated Software Engineering (ASE)
作者: Pikulin, Vladislav Kubo, Daiki Nissanka, Kaveesha Bandara, Sadeeptha Shamsiemon, Muhammad A. Yasmin, Arissha Jayatilaka, Asangi Madugalla, Anuradha Kanij, Tanjila Monash Univ Depatment Engn Kuala Lumpur Malaysia Univ Adelaide CREST Adelaide SA Australia Monash Univ Dept Software Syst & Cybersecur Melbourne Vic Australia
Software security continues to be a matter of concern for both end-users and developers, with the cost of potential lapses expected to become larger as software plays a larger role in society. Despite investments in s... 详细信息
来源: 评论
Vulnerabilities and secure coding for Serverless Applications on Cloud Computing
Vulnerabilities and Secure Coding for Serverless Application...
收藏 引用
Human Computer Interaction Thematic Area Conference Held as Part of the 24th International Conference on Human-Computer Interaction (HCII)
作者: Kim, Yonghwan Koo, Jahwan Kim, Ung-Mo Sungkyunkwan Univ Grad Sch Informat & Commun 25-2 Sungkyunkwan Ro Seoul South Korea
Cloud computing has enabled remarkable progress by providing many advantages such as low initial cost, high scalability and flexibility, and low maintenance cost. The success of cloud computing allows developers who w... 详细信息
来源: 评论
Key Generation and secure coding in Communications and Private Learning
Key Generation and Secure Coding in Communications and Priva...
收藏 引用
作者: Aldaghri, Nasser University of Michigan
学位级别:Ph.D., Doctor of Philosophy
The increasingly distributed nature of many current and future technologies has introduced many challenges for devices designed for such settings. Devices operating in such environments, such as Internet-of-Things (Io... 详细信息
来源: 评论
Toward a readiness model for secure software coding
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2023年 第4期53卷 1013-1035页
作者: Humayun, Mamoona Niazi, Mahmood Jhanjhi, Noor Zaman Mahmood, Sajjad Alshayeb, Mohammad Jouf Univ Coll Comp & Informat Sci Dept Informat Syst Al Jouf Saudi Arabia King Fahd Univ Petr & Minerals Dept Informat & Comp Sci Dhahran Saudi Arabia King Fahd Univ Petr & Minerals Interdisciplinary Res Ctr Intelligent Secure Syst Dhahran Saudi Arabia Taylors Univ Sch Comp Sci & Engn SCE Subang Jaya Selangor Malaysia
The heart of the application's secure operation is its software code. If the code contains flaws, the entire program might be hacked. The issue with software vulnerabilities is that they reveal coding flaws that h... 详细信息
来源: 评论
Combining Design by Contract and Programming Logic to Enhance secure coding Assistant System
Combining Design by Contract and Programming Logic to Enhanc...
收藏 引用
作者: Liang, Wenhui California State University Sacramento
学位级别:M.Sc., Master of Science
Code security or robustness has been an important topic in the recent decades for the research and software production communities. Defects in code can cause vulnerabilities in the program or system because it can be ... 详细信息
来源: 评论
Discussion on the Reform of secure coding
收藏 引用
计算机教育 2022年 第12期 43-48页
作者: Yi Ma Dongming Chen Dongqi Wang software college Northeastern UniversityShenyang110006China
secure coding is an indispensable part of the undergraduate training program for Information Security *** a basic course for undergraduates to carry out project engineering,its importance is *** the actual teaching ac... 详细信息
来源: 评论