咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=secure coding"
89 条 记 录,以下是1-10 订阅
排序:
secure coding and Ethical Hacking Workshops with NAO for Engaging K-12 Female Students in CS  4
Secure Coding and Ethical Hacking Workshops with NAO for Eng...
收藏 引用
4th Conference on Research on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT)
作者: Chattopadhyay, Ankur Grondahl, Kevin Ruckel, Jason Everson, Thomas Univ Wisconsin Comp Sci Green Bay WI 54302 USA
This research work is based upon the new Microsoft DigiSpark outreach project initiated by the computer science (CS) program at the University of Wisconsin - Green Bay (UWGB) in an effort to engage K-12 female learner... 详细信息
来源: 评论
Employing secure coding practices into industrial applications: a case study
收藏 引用
EMPIRICAL SOFTWARE ENGINEERING 2016年 第1期21卷 4-16页
作者: Khalili, Abdullah Sami, Ashkan Azimi, Mahdi Moshtari, Sara Salehi, Zahra Ghiasi, Mahboobe Safavi, Ali Akbar Shiraz Univ Sch Elect & Comp Engn CSE & IT Dept Shiraz Iran Shiraz Univ Sch Elect & Comp Engn Power & Control Engn Dept Shiraz Iran
Industrial Control Systems (ICS) are the vital part of modern critical infrastructures. Recent attacks to ICS indicate that these systems have various types of vulnerabilities. A large number of vulnerabilities are du... 详细信息
来源: 评论
A Study on the Optimization Method for the Rule Checker in the secure coding
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2014年 第1期8卷 333-342页
作者: Kim, JaeHyun Lee, YangSun Seokyeong Univ Dept Comp Engn 16-1 Jungneung Dong Seoul 136704 South Korea
Today's software allows data transfer with the use of internet. Therefore, there is always a threat of attack by hackers. These security weaknesses cause a critical economic loss which is a direct cause of softwar... 详细信息
来源: 评论
May the Source Be with You: On ChatGPT, Cybersecurity, and secure coding
收藏 引用
INFORMATION 2024年 第9期15卷 572页
作者: Gasiba, Tiago Espinha Iosif, Andrei-Cristian Kessba, Ibrahim Amburi, Sathwik Lechner, Ulrike Pinto-Albuquerque, Maria Siemens AG D-81739 Munich Germany Univ Bundeswehr Munchen Inst Schutz & Zuverlassigkeit Wirtschaftsinformat D-85579 Munich Germany Tech Univ Munich TUM Sch Computat Informat & Technol D-85748 Munich Germany ISTAR Inst Univ Lisboa ISCTE IUL P-1600189 Lisbon Portugal
Software security is an important topic that is gaining more and more attention due to the rising number of publicly known cybersecurity incidents. Previous research has shown that one way to address software security... 详细信息
来源: 评论
Towards the application of recommender systems to secure coding
收藏 引用
EURASIP JOURNAL ON INFORMATION SECURITY 2019年 第1期2019卷 1-24页
作者: Nembhard, Fitzroy D. Carvalho, Marco M. Eskridge, Thomas C. Florida Inst Technol Coll Engn & Sci 150 W Univ Blvd Melbourne FL 32901 USA
secure coding is crucial for the design of secure and efficient software and computing systems. However, many programmers avoid secure coding practices for a variety of reasons. Some of these reasons are lack of knowl... 详细信息
来源: 评论
secure coding Practices in Java: Challenges and Vulnerabilities  18
Secure Coding Practices in Java: Challenges and Vulnerabilit...
收藏 引用
40th ACM/IEEE International Conference on Software Engineering (ICSE)
作者: Meng, Na Nagy, Stefan Yao, Danfeng (Daphne) Zhuang, Wenjie Argoty, Gustavo Arango Virginia Tech Dept Comp Sci Blacksburg VA 24061 USA
The Java platform and its third-party libraries provide useful features to facilitate secure coding. However, misusing them can cost developers time and effort, as well as introduce security vulnerabilities in softwar... 详细信息
来源: 评论
Vulnerabilities and secure coding for Serverless Applications on Cloud Computing
Vulnerabilities and Secure Coding for Serverless Application...
收藏 引用
Human Computer Interaction Thematic Area Conference Held as Part of the 24th International Conference on Human-Computer Interaction (HCII)
作者: Kim, Yonghwan Koo, Jahwan Kim, Ung-Mo Sungkyunkwan Univ Grad Sch Informat & Commun 25-2 Sungkyunkwan Ro Seoul South Korea
Cloud computing has enabled remarkable progress by providing many advantages such as low initial cost, high scalability and flexibility, and low maintenance cost. The success of cloud computing allows developers who w... 详细信息
来源: 评论
Using Real-world Bug Bounty Programs in secure coding Course: Experience Report  29
Using Real-world Bug Bounty Programs in Secure Coding Course...
收藏 引用
29th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE)
作者: Malinka, Kamil Firc, Anton Loutocky, Pavel Vostoupal, Jakub Kristofik, Andrej Kasl, Frantisek Brno Univ Technol Brno Czech Republic Masaryk Univ Brno Czech Republic
To keep up with the growing number of cyber-attacks and associated threats, there is an ever-increasing demand for cybersecurity professionals and new methods and technologies. Training new cybersecurity professionals... 详细信息
来源: 评论
Game Programmers with secure coding
Game Programmers with Secure Coding
收藏 引用
3rd Annual International Conference on Computer Games Multimedia and Allied Technologies (CGAT)
作者: Nagmoti, Rinkesh Chung, Sam Endicott-Popovsky, Barbara Univ WA Tacoma Comp & Software Syst Inst Technol Tacoma WA 98402 USA Univ WA Tacoma Informat Technol & Syst Inst Technol Tacoma WA USA Univ WA Seattle Ctr Informat Assurance & Cybersecur Seattle WA USA
The purpose of this paper is to introduce software security for online games at two levels: first at the programming level and second at the web service level. Increasingly game developers are providing their games on... 详细信息
来源: 评论
Understanding and Improving secure coding Behavior with Eye Tracking Methodologies  20
Understanding and Improving Secure Coding Behavior with Eye ...
收藏 引用
ACM Southeast Conference (ACMSE)
作者: Davis, Daniel Zhu, Feng Univ Alabama Huntsville Comp Sci Dept Huntsville AL 35899 USA
secure coding is a mission that cannot be neglected as computing devices continue increasing. Every year, thousands of new software vulnerabilities are identified. Education is a crucial factor and a significant chall... 详细信息
来源: 评论