咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=Secure coding"
89 条 记 录,以下是41-50 订阅
排序:
Developer-Proof Prevention of SQL Injections  13th
Developer-Proof Prevention of SQL Injections
收藏 引用
13th International Symposium on Foundations and Practice of Security (FPS)
作者: Courant, Judicael Orange Cyberdefense Lyon France
SQL queries, when written by unskilled or hurried developers for web applications, are prone to SQL injections. We propose an alternative approach for querying SQL databases that does not suffer from this flaw. Our ap... 详细信息
来源: 评论
Minimizing Cognitive Overload in Cybersecurity Learning Materials: An Experimental Study Using Eye-Tracking  14th
Minimizing Cognitive Overload in Cybersecurity Learning Mate...
收藏 引用
14th IFIP WG 11.8 World Conference on Information Security Education (WISE)
作者: Bernard, Leon Raina, Sagar Taylor, Blair Kaza, Siddharth Towson Univ Dept Comp & Informat Sci Baltimore MD 21252 USA Mt St Mary Coll Div Maths & Informat Technol Newburgh NY USA
Cybersecurity education is critical in addressing the global cyber crisis. However, cybersecurity is inherently complex and teaching cyber can lead to cognitive overload among students. Cognitive load includes: 1) int... 详细信息
来源: 评论
Systematic Detection of State Variable Corruptions in Discrete Event System Specification Based Simulation
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2020年 第7期E103D卷 1769-1772页
作者: Lee, Hae Young Kim, Jin Myoung Cheongju Univ Cheongju South Korea SKKU Seoul South Korea
In this letter, we propose a more secure modeling and simulation approach that can systematically detect state variable corruptions caused by buffer overflows in simulation models. Using our approach, developers may n... 详细信息
来源: 评论
Code Obfuscation Technique for Enhancing Software Protection Against Reverse Engineering  2nd
Code Obfuscation Technique for Enhancing Software Protection...
收藏 引用
2nd International Conference of Artificial Intelligence, Medical Engineering, Education (AIMEE)
作者: Gnatyuk, Sergiy Kinzeryavyy, Vasyl Stepanenko, Iryna Gorbatyuk, Yana Gizun, Andrii Kotelianets, Vitalii Natl Aviat Univ Kiev Ukraine
Software reliability is an actual problem caused with absence of software protection techniques, especially absence of software code protection from reverse engineering. Computer piracy and illegal software usage make... 详细信息
来源: 评论
Designing a Serious Game: Teaching Developers to Embed Privacy into Software Systems  35
Designing a Serious Game: Teaching Developers to Embed Priva...
收藏 引用
35th IEEE/ACM International Conference on Automated Software Engineering (ASE)
作者: Arachchilage, Nalin Asanka Gamagedara Hameed, Mumtaz Abdul La Trobe Univ Bundoora Vic Australia Technovat Consulting & Amp Training PVT Male Maldives
Software applications continue to challenge user privacy when users interact with them. Privacy practices (e.g. Data Minimisation (DM), Privacy by Design (PbD) or General Data Protection Regulation (GDPR)) and related... 详细信息
来源: 评论
A Study on the Evaluation System through Software Weakness Analysis  11
A Study on the Evaluation System through Software Weakness A...
收藏 引用
Joint 11th International Conference on Soft Computing and Intelligent Systems and 21st International Symposium on Advanced Intelligent Systems (SCIS-ISIS)
作者: Kim, Kyung-won Chang, Seokmin Park, Kyubin Son, Yunsik Dongguk Univ Dept Comp Sci & Engn Seoul South Korea
Recently, Due to the rapid development of IT technology the software in the social infrastructure is increasing. However, cyber attacks that exploit software vulnerabilities are also increasing. This paper designed an... 详细信息
来源: 评论
Extracting Cryptographic Keys *** Applications
收藏 引用
Semiconductor Science and Information Devices 2021年 第2期3卷 1-11页
作者: Shaun Mc Brearty william Farrelly Kevin Curran Institute of Technology SligoIreland Letterkenny Institute of Technology LetterkennyIreland Ulster University DerryUnited Kingdom
In the absence of specialized encryption hardware,cryptographic operationsmust be performed in main *** such,it is common place for cybercriminals to examine the content of main memory with a view to retrievinghigh-va... 详细信息
来源: 评论
Designing a serious game: teaching developers to embed privacy into software systems  20
Designing a serious game: teaching developers to embed priva...
收藏 引用
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering
作者: Nalin Asanka Gamagedara Arachchilage Mumtaz Abdul Hameed La Trobe University Australia Technovation Consulting & Training PVT
Software applications continue to challenge user privacy when users interact with them. Privacy practices (e.g. Data Minimisation (DM), Privacy by Design (PbD) or General Data Protection Regulation (GDPR)) and related... 详细信息
来源: 评论
Is the OWASP Top 10 List Comprehensive Enough for Writing secure Code?  2020
Is the OWASP Top 10 List Comprehensive Enough for Writing Se...
收藏 引用
Proceedings of the 2020 International Conference on Big Data in Management
作者: Parth Sane Rochester Institute of Technology
The OWASP Top 10 is a list that is published by the Open Web Application Security Project (OWASP). The general purpose is to serve as a watchlist for bugs to avoid while writing code. This paper compares how many of t... 详细信息
来源: 评论
Hello world!: code responsibly: why cyber is a game changer for computer science education  20
Hello world!: code responsibly: why cyber is a game changer ...
收藏 引用
Proceedings of the 9th Computer Science Education Research Conference
作者: Blair Taylor Towson University
Cybersecurity continues to be a global crisis. The ever-growing need for cyber talent has challenged universities to build and expand cybersecurity programs, despite an acute shortage of cybersecurity *** every challe... 详细信息
来源: 评论