咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=secure coding"
89 条 记 录,以下是11-20 订阅
排序:
Information Technology Security Evaluation Using CERT C secure coding Standard
Information Technology Security Evaluation Using CERT C Secu...
收藏 引用
3rd International Conference on Future Generation Information Technology
作者: Lee, Taeseung Lee, Kwangwoo Won, Dongho Park, Namje Jeju Natl Univ Teachers Coll Dept Comp Educ Cheju South Korea Sungkyunkwan Univ Sch Informat & Commun Engn Informat Secur Grp Suwon 440746 Gyeonggi Do South Korea
IT products developed without due consideration of security issues have caused many security accidents over the last ten years. As a result, the importance of security in software development is increasing. It is impo... 详细信息
来源: 评论
Awareness of secure coding Guidelines in the Industry - A first data analysis  19
Awareness of Secure Coding Guidelines in the Industry - A fi...
收藏 引用
19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom)
作者: Gasiba, Tiago Espinha Lechner, Ulrike Pinto-Albuquerque, Maria Fernandez, Daniel Mendez Siemens AG Munich Germany Univ Bundeswehr Munchen Munich Germany Inst Univ Lisboa ISCTE IUL ISTAR IUL Lisbon Portugal Blekinge Inst Technol Karlskrona Sweden
Software needs to be secure, in particular, when deployed to critical infrastructures. secure coding guidelines capture practices in industrial software engineering to ensure the security of code. This study aims to a... 详细信息
来源: 评论
Teaching secure coding-Report from Summit on Education in secure Software  12
Teaching Secure Coding-Report from Summit on Education in Se...
收藏 引用
43rd ACM Technical Symposium on Computer Science Education (SIGCSE 2012)
作者: Taylor, Blair Bishop, Matt Burley, Diana Cooper, Steve Dodge, Ron Seacord, Robert Towson Univ Towson MD USA
Software is critical to life in the 21st century. It drives financial, medical, and government computer systems as well as systems that provide critical infrastructures in areas such as transportation, energy, network... 详细信息
来源: 评论
Design of secure coding Challenges for Cybersecurity Education in the Industry  13th
Design of Secure Coding Challenges for Cybersecurity Educati...
收藏 引用
13th International Conference on the Quality of Information and Communications Technology (QUATIC)
作者: Gasiba, Tiago Lechner, Ulrike Pinto-Albuquerque, Maria Zouitni, Alae Siemens AG Munich Germany Univ Bundeswehr Munchen Munich Germany ISTAR IUL Inst Univ Lisboa ISCTE IUL Lisbon Portugal Univ Passau Passau Germany
According to a recent survey with more than 4000 software developers, "less than half of developers can spot security holes". As a result, software products present a low-security quality expressed by vulner... 详细信息
来源: 评论
Supporting secure coding for Erlang  24
Supporting Secure Coding for Erlang
收藏 引用
39th Annual ACM Symposium on Applied Computing (SAC)
作者: Toth, Melinda Bozo, Istvan Eotvos Lorand Univ Fac Informat Budapest Hungary
Software developer/operator companies have to face growing cyber threats. secure coding is a development process resulting in software products that resist cyber-attacks. Although several security standards and guidel... 详细信息
来源: 评论
Raising secure coding Awareness for Software Developers in the Industry  27
Raising Secure Coding Awareness for Software Developers in t...
收藏 引用
IEEE 27th International Requirements Engineering Conference (REW)
作者: Gasiba, Tiago Lechner, Ulrike Siemens AG Munich Germany Univ Bundeswehr Munchen Munich Germany
Many industrial IT security standards and policies mandate the usage of a secure coding methodology in the software development process. This implies two different aspects: first, secure coding must be based on a set ... 详细信息
来源: 评论
Measuring secure coding Practice and Culture: A Finger Pointing at the Moon is not the Moon  23
Measuring Secure Coding Practice and Culture: A Finger Point...
收藏 引用
45th IEEE/ACM International Conference on Software Engineering (ICSE)
作者: Ryan, Ita Roedig, Utz Stol, Klaas-Jan Univ Coll Cork Sch Comp Sci & IT Adv Ctr Res Trainin Cork Ireland Univ Coll Cork Sch Comp Sci & IT Connect Res Ctr Cork Ireland Univ Coll Cork Sch Comp Sci & IT Lero SFI Res Ctr Software Cork Ireland
Software security research has a core problem: it is impossible to prove the security of complex software. A low number of known defects may simply indicate that the software has not been attacked yet, or that success... 详细信息
来源: 评论
Towards Developer-Centered secure coding Training  38
Towards Developer-Centered Secure Coding Training
收藏 引用
38th IEEE/ACM International Conference on Automated Software Engineering (ASE)
作者: Pikulin, Vladislav Kubo, Daiki Nissanka, Kaveesha Bandara, Sadeeptha Shamsiemon, Muhammad A. Yasmin, Arissha Jayatilaka, Asangi Madugalla, Anuradha Kanij, Tanjila Monash Univ Depatment Engn Kuala Lumpur Malaysia Univ Adelaide CREST Adelaide SA Australia Monash Univ Dept Software Syst & Cybersecur Melbourne Vic Australia
Software security continues to be a matter of concern for both end-users and developers, with the cost of potential lapses expected to become larger as software plays a larger role in society. Despite investments in s... 详细信息
来源: 评论
Combining Design by Contract and Programming Logic to Enhance secure coding Assistant System
Combining Design by Contract and Programming Logic to Enhanc...
收藏 引用
作者: Liang, Wenhui California State University Sacramento
学位级别:M.Sc., Master of Science
Code security or robustness has been an important topic in the recent decades for the research and software production communities. Defects in code can cause vulnerabilities in the program or system because it can be ... 详细信息
来源: 评论
Key Generation and secure coding in Communications and Private Learning
Key Generation and Secure Coding in Communications and Priva...
收藏 引用
作者: Aldaghri, Nasser University of Michigan
学位级别:Ph.D., Doctor of Philosophy
The increasingly distributed nature of many current and future technologies has introduced many challenges for devices designed for such settings. Devices operating in such environments, such as Internet-of-Things (Io... 详细信息
来源: 评论