咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=Secure coding"
89 条 记 录,以下是31-40 订阅
排序:
Motivating secure coding practices in a freshman-level programming course  14
Motivating secure coding practices in a freshman-level progr...
收藏 引用
Proceedings of the 2014 Information Security Curriculum Development Conference
作者: Bryson R. Payne Aaron R. Walker University of North Georgia Dahlonega GA
secure application development is becoming even more critical as the impact of insecure code becomes deeper and more pervasive in our personal and professional lives. The approach described in this paper seeks to moti... 详细信息
来源: 评论
Introducing secure coding in CS0, CS1, and CS2 (Abstract Only)  16
Introducing Secure Coding in CS0, CS1, and CS2 (Abstract Onl...
收藏 引用
Proceedings of the 47th ACM Technical Symposium on Computing Science Education
作者: Blair Taylor Siddharth Kaza Towson University Towson MD USA
The CS 2013 curriculum includes Information Assurance and Security as a pervasive knowledge area. However, introducing security in lower level courses is challenging because of lack of appropriate teaching resources a... 详细信息
来源: 评论
Detection and prevention of evasion attacks on machine learning models
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2025年 266卷
作者: Muthalagu, Raja Malik, Jasmita Pawar, Pranav M. BITS Pilani Dept Comp Sci Dubai U Arab Emirates
With the increasing use of machine learning models in critical applications such as image classification, natural language processing, and cybersecurity, there is a growing concern about the vulnerability of these mod... 详细信息
来源: 评论
Evaluating Serious Slow Game Jams as a Mechanism for Co-Designing Serious Games to Improve Understanding of Cybersecurity
收藏 引用
Games: Research and Practice 2025年 第1期3卷 1-30页
作者: Shenando Stals Lynne Baillie Jamie Iona Ferguson Daisy Abbott Manuel Maarek Ryan Shah Sandy Louchart Heriot-Watt University Edinburgh United Kingdom of Great Britain and Northern Ireland School of Simulation and Visualisation The Glasgow School of Art Glasgow United Kingdom of Great Britain and Northern Ireland
We present a first evaluation of a Serious Slow Game Jam (SSGJ) methodology as a mechanism for co-designing serious games in the application domain of cybersecurity to assess how the SSGJ contributed to improving the ... 详细信息
来源: 评论
Measurement of Embedding Choices on Cryptographic API Completion Tasks
收藏 引用
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY 2024年 第3期33卷 1-30页
作者: Xiao, Ya Song, Wenjia Ahmed, Salman Ge, Xinyang Viswanath, Bimal Meng, Na Yao, Danfeng (Daphne) Virginia Tech Blacksburg VA 24061 USA
In this article, we conduct a measurement study to comprehensively compare the accuracy impacts of multiple embedding options in cryptographic API completion tasks. Embedding is the process of automatically learning v... 详细信息
来源: 评论
Intersecured joint image compression with encryption purpose based on fractal mating coding
收藏 引用
OPTICAL ENGINEERING 2007年 第3期46卷 037002-1-037002页
作者: Chang, Hsuan T. Lin, Chung C. Natl Yunlin Univ Sci & Technol Photon & Informat Lab Dept Elect Engn Douliu Yunlin 64045 Taiwan
A secure coding concept for pairwise images is revealed and implemented by the use of the proposed fractal mating coding scheme, in which the domain pools consist of the domain blocks selected from the pairwise images... 详细信息
来源: 评论
Thriving in the era of hybrid work: Raising cybersecurity awareness using serious games in industry trainings☆
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2024年 210卷
作者: Zhao, Tiange Gasiba, Tiago Lechner, Ulrike -Albuquerque, Maria Pinto Siemens AG Otto Hahn Ring 6 D-81739 Munich Germany Univ Bundeswehr Munich Werner Heisenberg Weg 39 D-85579 Neubiberg Germany Inst Univ Lisboa IUL ISTAR ISCTE Ave Forcas Armadas P-1649026 Lisbon Portugal
The important missions of modern software engineering education are to prepare software engineers to work in a hybrid mode and to address the need to enable them to write secure code and deliver secure products and se... 详细信息
来源: 评论
ValAsp: A Tool for Data Validation in Answer Set Programming
收藏 引用
THEORY AND PRACTICE OF LOGIC PROGRAMMING 2023年 第5期23卷 965-985页
作者: Alviano, Mario Dodaro, Carmine Zamayla, Arnel Univ Calabria Dept Math & Comp Sci Via P BucciCubo 30B I-87036 Arcavacata Di Rende CS Italy
The development of complex software requires tools promoting fail-fast approaches, so that bugs and unexpected behavior can be quickly identified and fixed. Tools for data validation may save the day of computer progr... 详细信息
来源: 评论
Script-templates for the Content Security Policy
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2014年 第3期19卷 209-223页
作者: Johns, Martin SAP Res Karlsruhe Germany
Content Security Policies (CSPs) provide powerful means to mitigate most XSS exploits. However, CSP's protection is incomplete. Insecure server-side JavaScript generation and attacker control over script-sources c... 详细信息
来源: 评论
Adaption of Integrated secure Guide for secure Software Development Lifecycle
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2016年 第6期10卷 145-154页
作者: Lee, Ki-Hyun Park, Young B. Dankook Univ Dept Software Secur Juk Jeon South Korea Dankook Univ Dept Comp Engn Cheonan South Korea
As interests in security increases, several software development lifecycle considering security have been proposed. Actual results of applying software development lifecycle considering security reduced threats have b... 详细信息
来源: 评论