咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=Secure coding"
89 条 记 录,以下是51-60 订阅
排序:
Cybersecurity Challenges in Industry: Measuring the Challenge Solve Time to Inform Future Challenges
收藏 引用
INFORMATION 2020年 第11期11卷 533页
作者: Espinha Gasiba, Tiago Lechner, Ulrike Pinto-Albuquerque, Maria Siemens AG D-81379 Munich Germany Univ Bundeswehr Munchen Inst Angew Informat D-85579 Neubiberg Germany Inst Univ Lisboa ISCTE IUL ISTAR IUL Dept Ciencias & Tecnol Informacao P-1649026 Lisbon Portugal
Cybersecurity vulnerabilities in industrial control systems have been steadily increasing over the last few years. One possible way to address this issue is through raising the awareness (through education) of softwar... 详细信息
来源: 评论
An Approach for Reduce Vulnerabilities in Web Information Systems  2nd
An Approach for Reduce Vulnerabilities in Web Information Sy...
收藏 引用
2nd Conference on Computational Methods in Systems and Software (CoMeSySo)
作者: Leite, Gleidson Sobreira Albuquerque, Adriano Bessa Univ Fortaleza Fortaleza Ceara Brazil
The evolution of the Internet has brought a significant change in the evolution of software, resulting in an increasing presence of Information Systems in Web environments and, consequently, an increase in security vu... 详细信息
来源: 评论
OpenOSC: Open Source Object Size Checking Library With Built-in Metrics
OpenOSC: Open Source Object Size Checking Library With Built...
收藏 引用
IEEE secure Development Conference (IEEE SecDev)
作者: Han, Yongkui Shah, Pankil Van Nguyen Ma, Ling Livingston, Richard Cisco Syst Boxboro MA 01719 USA Cisco Syst Knoxville TN USA
OpenOSC provides value to software development in detecting destination buffer overruns and source buffer over-reads. OpenOSC is presented as open, extensible, object size checking (OSC) library written in C that inte... 详细信息
来源: 评论
Introducing secure coding in CS0 and CS1 (abstract only)  13
Introducing secure coding in CS0 and CS1 (abstract only)
收藏 引用
Proceeding of the 44th ACM technical symposium on Computer science education
作者: Matt Bishop Blair Taylor Elizabeth K. Hawthorne Diana Burley Siddharth Kaza University of California at Davis Davis California USA Towson University Towson Maryland USA Union County College Cranford New Jersey USA The George Washington University Washington D.C. USA
The CS 2013 curriculum draft includes Information Assurance and Security as a pervasive knowledge area. However, introducing security in CS0 and CS1 is challenging because of lack of appropriate teaching resources and... 详细信息
来源: 评论
Teaching secure coding: the myths and the realities  13
Teaching secure coding: the myths and the realities
收藏 引用
Proceeding of the 44th ACM technical symposium on Computer science education
作者: Blair Taylor Matt Bishop Elizabeth Hawthorne Kara Nance Towson University Towson MD USA University of California at Davis Davis CA USA Union County College Cranford NJ USA University of Alaska Fairbanks Fairbanks AK USA
Teaching secure coding has never been more important. The CS2013 Ironman draft includes Information Assurance and Security as a new Knowledge Area and recommends that security be cross-cutting across all undergraduate... 详细信息
来源: 评论
The Importance of Safe coding Practices and Possible Impacts on the Lack of Their Application  8th
The Importance of Safe Coding Practices and Possible Impacts...
收藏 引用
8th Computer Science On-Line Conference (CSOC)
作者: Leite, Gleidson Sobreira Albuquerque, Adriano Bessa Univ Fortaleza Fortaleza CE Brazil
A significant change in the way organizations and companies use software has been brought by the evolution of the Internet over the time, resulting in an increasing presence of Information Systems in Web environments ... 详细信息
来源: 评论
Sifu-a cybersecurity awareness platform with challenge assessment and intelligent coach
收藏 引用
Cybersecurity 2018年 第1期1卷 945-967页
作者: Tiago Espinha Gasiba Ulrike Lechner Maria Pinto-Albuquerque Siemens AG Corporate Technology Otto-Hahn-Rin 681379 MunichBavariaGermany Universitat der Bundeswehr München MunichGermany Instituto Universitario de Lisboa(ISCTE-IUL) ISTAR-IULLisbonPortugal
Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic *** handling of software vulnerabilities is essential in the industrial context,particularly when the software is deployed... 详细信息
来源: 评论
Locating SQL Injection Vulnerabilities in Java Byte Code using Natural Language Techniques
Locating SQL Injection Vulnerabilities in Java Byte Code usi...
收藏 引用
IEEE SoutheastCon Conference
作者: Jackson, Kevin A. Bennett, Brian T. East Tennessee State Univ Dept Comp Johnson City TN 37614 USA
With so much our daily lives relying on digital devices like personal computers and cell phones, there is a growing demand for code that not only functions properly, but is secure and keeps user data safe. However, en... 详细信息
来源: 评论
secure Modules for Undergraduate Software Engineering Courses  48
Secure Modules for Undergraduate Software Engineering Course...
收藏 引用
48th IEEE Frontiers in Education Conference (FIE)
作者: Yang, Jeong Lodgher, Akhtar Lee, Young Texas A&M Univ Comp & Cyber Secur San Antonio TX 78224 USA
Security affects every software component in different types of computing systems. Many vulnerabilities and attacks on software systems are due to security weaknesses in the software itself. During the process of soft... 详细信息
来源: 评论
Discussion of Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2019  19
Discussion of Integrating Hands-on Cybersecurity Exercises i...
收藏 引用
Proceedings of the 50th ACM Technical Symposium on Computer Science Education
作者: Richard Weiss Jens Mache Blair Taylor Siddharth Kaza Ankur Chattopadhyay Evergreen State College Olympia WA USA Lewis and Clark College Portland OR USA Towson University Towson MD USA University of Wisconsin at Green Bay Green Bay WI USA
The critical shortage of cyber security professionals remains an unsolved problem. We need to greatly expand the community in order to meet the increasing demand. The number of security-focused competitions and exerci... 详细信息
来源: 评论