咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=Secure coding"
89 条 记 录,以下是11-20 订阅
排序:
Understanding and Improving secure coding Behavior with Eye Tracking Methodologies  20
Understanding and Improving Secure Coding Behavior with Eye ...
收藏 引用
ACM Southeast Conference (ACMSE)
作者: Davis, Daniel Zhu, Feng Univ Alabama Huntsville Comp Sci Dept Huntsville AL 35899 USA
secure coding is a mission that cannot be neglected as computing devices continue increasing. Every year, thousands of new software vulnerabilities are identified. Education is a crucial factor and a significant chall... 详细信息
来源: 评论
Awareness of secure coding Guidelines in the Industry - A first data analysis  19
Awareness of Secure Coding Guidelines in the Industry - A fi...
收藏 引用
19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom)
作者: Gasiba, Tiago Espinha Lechner, Ulrike Pinto-Albuquerque, Maria Fernandez, Daniel Mendez Siemens AG Munich Germany Univ Bundeswehr Munchen Munich Germany Inst Univ Lisboa ISCTE IUL ISTAR IUL Lisbon Portugal Blekinge Inst Technol Karlskrona Sweden
Software needs to be secure, in particular, when deployed to critical infrastructures. secure coding guidelines capture practices in industrial software engineering to ensure the security of code. This study aims to a... 详细信息
来源: 评论
Design of secure coding Challenges for Cybersecurity Education in the Industry  13th
Design of Secure Coding Challenges for Cybersecurity Educati...
收藏 引用
13th International Conference on the Quality of Information and Communications Technology (QUATIC)
作者: Gasiba, Tiago Lechner, Ulrike Pinto-Albuquerque, Maria Zouitni, Alae Siemens AG Munich Germany Univ Bundeswehr Munchen Munich Germany ISTAR IUL Inst Univ Lisboa ISCTE IUL Lisbon Portugal Univ Passau Passau Germany
According to a recent survey with more than 4000 software developers, "less than half of developers can spot security holes". As a result, software products present a low-security quality expressed by vulner... 详细信息
来源: 评论
secure coding and Ethical Hacking Workshops with NAO for Engaging K-12 Female Students in CS  4
Secure Coding and Ethical Hacking Workshops with NAO for Eng...
收藏 引用
4th Conference on Research on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT)
作者: Chattopadhyay, Ankur Grondahl, Kevin Ruckel, Jason Everson, Thomas Univ Wisconsin Comp Sci Green Bay WI 54302 USA
This research work is based upon the new Microsoft DigiSpark outreach project initiated by the computer science (CS) program at the University of Wisconsin - Green Bay (UWGB) in an effort to engage K-12 female learner... 详细信息
来源: 评论
Towards the application of recommender systems to secure coding
收藏 引用
EURASIP JOURNAL ON INFORMATION SECURITY 2019年 第1期2019卷 1-24页
作者: Nembhard, Fitzroy D. Carvalho, Marco M. Eskridge, Thomas C. Florida Inst Technol Coll Engn & Sci 150 W Univ Blvd Melbourne FL 32901 USA
secure coding is crucial for the design of secure and efficient software and computing systems. However, many programmers avoid secure coding practices for a variety of reasons. Some of these reasons are lack of knowl... 详细信息
来源: 评论
Raising secure coding Awareness for Software Developers in the Industry  27
Raising Secure Coding Awareness for Software Developers in t...
收藏 引用
IEEE 27th International Requirements Engineering Conference (REW)
作者: Gasiba, Tiago Lechner, Ulrike Siemens AG Munich Germany Univ Bundeswehr Munchen Munich Germany
Many industrial IT security standards and policies mandate the usage of a secure coding methodology in the software development process. This implies two different aspects: first, secure coding must be based on a set ... 详细信息
来源: 评论
secure coding Practices in Java: Challenges and Vulnerabilities  18
Secure Coding Practices in Java: Challenges and Vulnerabilit...
收藏 引用
40th ACM/IEEE International Conference on Software Engineering (ICSE)
作者: Meng, Na Nagy, Stefan Yao, Danfeng (Daphne) Zhuang, Wenjie Argoty, Gustavo Arango Virginia Tech Dept Comp Sci Blacksburg VA 24061 USA
The Java platform and its third-party libraries provide useful features to facilitate secure coding. However, misusing them can cost developers time and effort, as well as introduce security vulnerabilities in softwar... 详细信息
来源: 评论
Introducing secure coding in Undergraduate (CS0, CS1, and CS2) and High School (AP Computer Science A) Programming Courses  18
Introducing Secure Coding in Undergraduate (CS0, CS1, and CS...
收藏 引用
49th ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE)
作者: Kozo, Siddharth Taylor, Blair Towson Univ Towson MD USA
The ACM CS 2013 curriculum includes Information Assurance and Security as a pervasive knowledge area, the ACM Community College curricular guidelines, CSTransfer2017, places great emphasis on cybersecurity as well. Ho... 详细信息
来源: 评论
Employing secure coding practices into industrial applications: a case study
收藏 引用
EMPIRICAL SOFTWARE ENGINEERING 2016年 第1期21卷 4-16页
作者: Khalili, Abdullah Sami, Ashkan Azimi, Mahdi Moshtari, Sara Salehi, Zahra Ghiasi, Mahboobe Safavi, Ali Akbar Shiraz Univ Sch Elect & Comp Engn CSE & IT Dept Shiraz Iran Shiraz Univ Sch Elect & Comp Engn Power & Control Engn Dept Shiraz Iran
Industrial Control Systems (ICS) are the vital part of modern critical infrastructures. Recent attacks to ICS indicate that these systems have various types of vulnerabilities. A large number of vulnerabilities are du... 详细信息
来源: 评论
Security Injections@Towson: Integrating secure coding into Introductory Computer Science Courses
收藏 引用
ACM TRANSACTIONS ON COMPUTING EDUCATION 2016年 第4期16卷 16-16页
作者: Taylor, Blair Kaza, Siddharth Towson Univ Towson MD USA Dept Comp & Informat Sci 7800 York Rd Towson MD 21252 USA
Despite the critical societal importance of computer security, security is not well integrated into the undergraduate computing curriculum. Security classes and tracks treat security issues as separable topics as oppo... 详细信息
来源: 评论