咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=Secure coding"
89 条 记 录,以下是81-90 订阅
排序:
Interactive e-learning modules for teaching secure: a pilot study (abstract only)  14
Interactive e-learning modules for teaching secure: a pilot ...
收藏 引用
Proceedings of the 45th ACM technical symposium on Computer science education
作者: Sagar Raina Blair Taylor Siddharth Kaza Towson University Towson MD USA
Addressing the crucial need for cybersecurity learning materials, the Security Injections @ Towson project (***/securityinjections) has developed modules for CS0, CS1, CS2 and Computer Literacy courses that target key... 详细信息
来源: 评论
Study on the Principle and Defense of Buffer Overflow Attacks
Study on the Principle and Defense of Buffer Overflow Attack...
收藏 引用
4th International Conference on Graphic and Image Processing (ICGIP)
作者: Lin, Wang Beijing City Univ Network Informat Ctr Beijing Peoples R China
Buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area. With specific programs, this paper describes in detail the type o... 详细信息
来源: 评论
Student Centric Design for Cyber Security Knowledge Empowerment  2012
Student Centric Design for Cyber Security Knowledge Empowerm...
收藏 引用
IEEE International Conference on Technology Enhanced Education (ICTEE)
作者: Joshi, Avinash Ramani, Varrun Murali, Hrishikesh Krishnan, Radhesh Mithra, Zubin Pavithran, Vipin Amrita Centre for Cybersecurity India
Basics of computer science and engineering are a part of every major curriculum taught in colleges and universities across India. Numerous Indian websites are compromised frequently mainly due to insecure coding pract... 详细信息
来源: 评论
Scalable and Reusable Attack Aware Software
Scalable and Reusable Attack Aware Software
收藏 引用
ASE International Conference on BioMedical Computing (BioMedCom)
作者: Kim, William Moon, Cheolmin Sky Chung, Sam Escrig, Teresa Endicott-Popovsky, Barbara Univ Washington Tacoma Inst Technol Tacoma WA 98402 USA Univ Washington Ctr Informat Assurance & Cybersecur Seattle WA 98105 USA
Developing and maintaining security software systems can be cost-prohibitive for all but the largest organizations. New requirements of hardware and software quickly outdate current security systems. Modern software a... 详细信息
来源: 评论
Scalable and Reusable Attack Aware Software
Scalable and Reusable Attack Aware Software
收藏 引用
ASE/IEEE International Conference on BioMedical Computing (BioMedCom)
作者: William Kim Cheolmin Sky Moon Sam Chung Teresa Escrig Barbara Endicott-Popovsky Institute of Technology University of Washington Tacoma Tacoma WA USA Center for Information Assurance and Cybersecurity University of Washington Seattle Seattle WA USA
Developing and maintaining security software systems can be cost-prohibitive for all but the largest organizations. New requirements of hardware and software quickly outdate current security systems. Modern software a... 详细信息
来源: 评论
Embedding security into visual programming courses  11
Embedding security into visual programming courses
收藏 引用
Proceedings of the 2011 Information Security Curriculum Development Conference
作者: Myung Ah Park University of Central Oklahoma Edmond OK
A visual programming course can be set up in a way that draws a general audience from different disciplines in addition to serving majors. Thereby embedding security into a visual programming course can be effective n... 详细信息
来源: 评论
Software Reengineering Based Security Teaching
Software Reengineering Based Security Teaching
收藏 引用
3rd International Multi-Conference on Engineering and Technological Innovation
作者: Chung, Sam Endicott-Popovsky, Barbara Univ Washington Inst Technol Comp & Software Syst Tacoma WA 98402 USA Univ Washington Ctr Informat Assurance & Cyber Secur Seattle WA 98195 USA
The problem of developing secure code is well known to high-tech sector companies. Some, like Microsoft, have found it necessary to establish ongoing security training for their developers to make up for the absence o... 详细信息
来源: 评论
Intersecured joint image compression with encryption purpose based on fractal mating coding
收藏 引用
OPTICAL ENGINEERING 2007年 第3期46卷 037002-1-037002页
作者: Chang, Hsuan T. Lin, Chung C. Natl Yunlin Univ Sci & Technol Photon & Informat Lab Dept Elect Engn Douliu Yunlin 64045 Taiwan
A secure coding concept for pairwise images is revealed and implemented by the use of the proposed fractal mating coding scheme, in which the domain pools consist of the domain blocks selected from the pairwise images... 详细信息
来源: 评论
Efficient encryption of wavelet-based coded color images
收藏 引用
PATTERN RECOGNITION 2005年 第7期38卷 1111-1115页
作者: Martin, K Lukac, R Plataniotis, KN Univ Toronto Edward S Rogers Sr Dept ECE Multimedia Lab Toronto ON M5S 3G4 Canada
An efficient, secure color image coder incorporating Color-SPIHT (C-SPIHT) compression and partial encryption is presented. Confidentiality of the image data is achieved by encrypting only the significance bits of ind... 详细信息
来源: 评论