咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=Secure coding"
89 条 记 录,以下是31-40 订阅
排序:
Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels
Empirical Analysis of Software Vulnerabilities Causing Timin...
收藏 引用
IEEE Conference on Communications and Network Security (CNS)
作者: Kholoosi, M. Mehdi Babar, M. Ali Yilmaz, Cemal Univ Adelaide CREST Sch Comp Sci Adelaide SA Australia Cyber Secur Cooperat Res Ctr Adelaide SA Australia Sabanci Univ Fac Engn & Nat Sci TR-34956 Istanbul Turkiye
Timing attacks are considered one of the most damaging side-channel attacks. These attacks exploit timing fluctuations caused by certain operations to disclose confidential information to an attacker. For instance, in... 详细信息
来源: 评论
VaultBox: Enhancing the Security and Effectiveness of Security Analytics  5th
VaultBox: Enhancing the Security and Effectiveness of Securi...
收藏 引用
5th International Conference on Science of Cyber Security (SciSec)
作者: Trivedi, Devharsh Triandopoulos, Nikos Stevens Inst Technol Hoboken NJ 07030 USA
Security tools like Firewalls, IDS, IPS, SIEM, EDR, and NDR effectively detect and block threats. However, these tools depend on the system, application, and event logs. Logs are the key ingredient for various purpose... 详细信息
来源: 评论
A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments  1
收藏 引用
1st International Conference on Ubiquitous Security (UbiSec)
作者: Iosif, Andrei-Cristian Gasiba, Tiago Espinha Zhao, Tiange Lechner, Ulrike Pinto-Albuquerque, Maria Tech Univ Munich Munich Germany Siemens AG Munich Germany Univ Bundeswehr Munchen Neubiberg Germany Inst Univ Lisboa ISCTE IUL ISTAR Lisbon Portugal
As cloud deployments are becoming ubiquitous, the rapid adoption of this new paradigm may potentially bring additional cyber security issues. It is crucial that practitioners and researchers pose questions about the c... 详细信息
来源: 评论
Can gamification help to teach Cybersecurity?  20
Can gamification help to teach Cybersecurity?
收藏 引用
20th International Conference on Information Technology Based Higher Education and Training (ITHET)
作者: Berisford, Christopher J. Blackburn, Leighton Ollett, Jennifer M. Tonner, Thomas B. Yuen, Chun San Hugh Walton, Ryan Olayinka, Olakunle Univ Sheffield Dept Comp Sci Sheffield England
Over the last decade, there has been an increase in the number of attacks on web applications. The proliferation of these attacks is partially a result of increased adoption of IT systems in organisations and the incr... 详细信息
来源: 评论
Evaluating Serious Slow Game Jams as a Mechanism for Co-Designing Serious Games to Improve Understanding of Cybersecurity
收藏 引用
Games: Research and Practice 2025年 第1期3卷 1-30页
作者: Shenando Stals Lynne Baillie Jamie Iona Ferguson Daisy Abbott Manuel Maarek Ryan Shah Sandy Louchart Heriot-Watt University Edinburgh United Kingdom of Great Britain and Northern Ireland School of Simulation and Visualisation The Glasgow School of Art Glasgow United Kingdom of Great Britain and Northern Ireland
We present a first evaluation of a Serious Slow Game Jam (SSGJ) methodology as a mechanism for co-designing serious games in the application domain of cybersecurity to assess how the SSGJ contributed to improving the ... 详细信息
来源: 评论
Scaffolded Live coding: A Hybrid Pedagogical Approach for Enhanced Teaching of coding Skills
Scaffolded Live Coding: A Hybrid Pedagogical Approach for En...
收藏 引用
IEEE Frontiers in Education Conference (FIE)
作者: Chattopadhyay, Ankur Ryan, Drew Pockrandt, James Northern Kentucky Univ Dept Comp Sci Highland Hts KY 41076 USA Univ Wisconsin Dept Comp Sci Green Bay WI USA
This Full paper in the Innovative Practice Category describes a novel research study that is based upon an experimental scaffolding of live coding techniques used towards teaching a traditional face to face undergrad ... 详细信息
来源: 评论
Web Cryptography API: Prevalence and Possible Developer Mistakes  22
Web Cryptography API: Prevalence and Possible Developer Mist...
收藏 引用
17th International Conference on Availability, Reliability and Security (ARES)
作者: Wichmann, Pascal Blochberger, Maximilian Federrath, Hannes Univ Hamburg Secur Distributed Syst Hamburg Germany
In this paper, we analyze mistakes that web developers can make when using the Web Cryptography API. We evaluate the impact of the uncovered mistakes and discuss how they can be prevented. Furthermore, we derive best ... 详细信息
来源: 评论
Introducing secure coding in CS0, CS1, and CS2 (abstract only)  14
Introducing secure coding in CS0, CS1, and CS2 (abstract onl...
收藏 引用
Proceedings of the 45th ACM technical symposium on Computer science education
作者: Blair Taylor Siddharth Kaza Elizabeth Hawthorne Towson University Towson MD USA Union County College Cranford NJ USA
The CS 2013 curriculum includes Information Assurance and Security as a pervasive knowledge area. However, introducing security in lower level courses is challenging because of lack of appropriate teaching resources a... 详细信息
来源: 评论
Motivating secure coding practices in a freshman-level programming course  14
Motivating secure coding practices in a freshman-level progr...
收藏 引用
Proceedings of the 2014 Information Security Curriculum Development Conference
作者: Bryson R. Payne Aaron R. Walker University of North Georgia Dahlonega GA
secure application development is becoming even more critical as the impact of insecure code becomes deeper and more pervasive in our personal and professional lives. The approach described in this paper seeks to moti... 详细信息
来源: 评论
Raising Security Awareness of Cloud Deployments using Infrastructure as Code through CyberSecurity Challenges  21
Raising Security Awareness of Cloud Deployments using Infras...
收藏 引用
16th International Conference on Availability, Reliability and Security (ARES)
作者: Gasiba, Tiago Espinha Andrei-Cristian, Iosif Lechner, Ulrike Pinto-Albuquerque, Maria Siemens AG T RDA CST SEL DE Munich Germany Tech Univ Munich Munich Germany Univ Bundeswehr Munchen Neubiberg Germany Inst Univ Lisboa ISCTE IUL ISTAR Lisbon Portugal
Improper deployment of software can have serious consequences, ranging from simple downtime to permanent data loss and data breaches. Infrastructure as Code tools serve to streamline delivery by promising consistency ... 详细信息
来源: 评论