咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=Secure coding"
89 条 记 录,以下是71-80 订阅
排序:
Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only)  17
Building and Supporting a Community of CS Educators Teaching...
收藏 引用
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education
作者: Richard Weiss Ambareen Siraj Jens Mache Elizabeth Hawthorne Blair Taylor Siddharth Kaza Michael E. Locasto The Evergreen State College Olympia WA USA Tennessee Tech University Cookeville TN USA Lewis and Clark College Portland OR USA Union County College Cranford NJ USA Towson University Towson MD USA SRI International New York NY USA
We have been teaching cybersecurity using hands-on, interactive exercises that have successfully engaged students. However, in order to meet the increasing demand for security professionals, we need to greatly expand ... 详细信息
来源: 评论
Hands-on Cybersecurity Exercises That are Easy to Access and Assess (Abstract Only)  17
Hands-on Cybersecurity Exercises That are Easy to Access and...
收藏 引用
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education
作者: Richard Weiss Jens Mache Michael E. Locasto Frankly Turbak The Evergreen State College Olympia WA USA Lewis and Clark College Portland OR USA SRI International New York NY USA Wellesley College Wellesley MA USA
Cybersecurity is a topic of growing interest for CS educators. The goal of this workshop is to empower faculty to add hands-on security exercises to their courses. We introduce EDURange, a framework for accessing, dev... 详细信息
来源: 评论
Mining Cryptography Misuse in Online Forums  2
Mining Cryptography Misuse in Online Forums
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)
作者: Braga, Alexandre Dahab, Ricardo State Univ Campinas UNICAMP Inst Comp Campinas SP Brazil
This work analyzes cryptography misuse by software developers, from their contributions to online forums on cryptography-based security and cryptographic programming. We studied three popular forums: Oracle Java Crypt... 详细信息
来源: 评论
Teaching safe coding via comparative languages
Journal of Computing Sciences in Colleges
收藏 引用
Journal of Computing Sciences in Colleges 2017年 第4期32卷
作者: David A. Cook Anne Marie Eubanks Stephen F. Austin State University
We recently taught a Special Projects course aimed at introducing students into writing safe code - code that would be robust and reliable in embedded or real-time applications. This paper is a synopsis of the experie... 详细信息
来源: 评论
OPTIMAL COMMUNICATION OF REAL TIME DATA ON secure CDMA IP RAN NETWORK
OPTIMAL COMMUNICATION OF REAL TIME DATA ON SECURE CDMA IP RA...
收藏 引用
International Conference on Signal Processing, Communication, Power and Embedded System
作者: E. Venkat Reddy K. Srinivasa Rao ECE BIET R.R Dist Hyderabad Telangana-India ECE DRK Institute of Science & Technology R.R Dist Hyderabad Telangana-India
This paper presents an optimal and secure communication of real time data over a CDMA based IP RAN network. In the process of data transmission, a new coding approach for security enhancement and quality improvement b... 详细信息
来源: 评论
Assessment of Security Knowledge, Skills and Abilities using Hands-On Exercises in 2016 (Abstract Only)  16
Assessment of Security Knowledge, Skills and Abilities using...
收藏 引用
Proceedings of the 47th ACM Technical Symposium on Computing Science Education
作者: Richard Weiss MIchael E. Locasto Jens Mache Blair Taylor Elizabeth Hawthorne Siddharth Kaza Ambareen Siraj The Evergreen State College Olympia WA USA University of Calgary Calgary AB Canada Lewis and Clark College Portland OR USA Towson University Towson MD USA Union County College Cranford NJ USA Tennessee Tach University Cookeville TN USA
We see teaching cybersecurity through hands-on, interactive exercises as a way to engage students. However, we also want to assess how much students are learning from these exercises, and the exercises themselves coul... 详细信息
来源: 评论
Security Assessment by Google Hacking Automation Tools for the Web Sites of Korea and the USA Universities
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2015年 第5期9卷 163-173页
作者: Bae, Mi Young Lim, Hankyu Andong Natl Univ Dept Multimedia Engn Andong South Korea
As software exchanges data in the internet environment, it is always susceptible to the malicious attacks of hackers. Google Search enables individuals to randomly search servers with their preferred vulnerabilities u... 详细信息
来源: 评论
Game Programmers with secure coding
Game Programmers with Secure Coding
收藏 引用
3rd Annual International Conference on Computer Games Multimedia and Allied Technologies (CGAT)
作者: Nagmoti, Rinkesh Chung, Sam Endicott-Popovsky, Barbara Univ WA Tacoma Comp & Software Syst Inst Technol Tacoma WA 98402 USA Univ WA Tacoma Informat Technol & Syst Inst Technol Tacoma WA USA Univ WA Seattle Ctr Informat Assurance & Cybersecur Seattle WA USA
The purpose of this paper is to introduce software security for online games at two levels: first at the programming level and second at the web service level. Increasingly game developers are providing their games on... 详细信息
来源: 评论
Teaching Security Using Hands-on Exercises in 2015 (Abstract Only)  15
Teaching Security Using Hands-on Exercises in 2015 (Abstract...
收藏 引用
Proceedings of the 46th ACM Technical Symposium on Computer Science Education
作者: Richard Weiss Michael Locasto Jens Mache Blair Taylor Elizabeth Hawthorne Justin Cappos Ambereen Siraj The Evergreen State College Olympia WA USA The University of Calgary Calgary AB Canada Lewis & Clark College Portland OR USA Towson University Towson MD USA Union County College Cranford NJ USA New York University New York NY USA Tennessee Technical University Cookeville TN USA
We see teaching cybersecurity through hands-on, interactive exercises as a way to engage students. Some of the exercises that we have seen require significant preparation on the part of the instructor. Having a commun... 详细信息
来源: 评论
Script-templates for the Content Security Policy
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2014年 第3期19卷 209-223页
作者: Johns, Martin SAP Res Karlsruhe Germany
Content Security Policies (CSPs) provide powerful means to mitigate most XSS exploits. However, CSP's protection is incomplete. Insecure server-side JavaScript generation and attacker control over script-sources c... 详细信息
来源: 评论