咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=secure coding"
89 条 记 录,以下是21-30 订阅
排序:
Introducing secure coding in CS0, CS1, and CS2 (Abstract Only)  16
Introducing Secure Coding in CS0, CS1, and CS2 (Abstract Onl...
收藏 引用
Proceedings of the 47th ACM Technical Symposium on Computing Science Education
作者: Blair Taylor Siddharth Kaza Towson University Towson MD USA
The CS 2013 curriculum includes Information Assurance and Security as a pervasive knowledge area. However, introducing security in lower level courses is challenging because of lack of appropriate teaching resources a... 详细信息
来源: 评论
Introducing secure coding in CS0, CS1, and CS2. (Abstract Only)  15
Introducing Secure Coding in CS0, CS1, and CS2. (Abstract On...
收藏 引用
Proceedings of the 46th ACM Technical Symposium on Computer Science Education
作者: Siddharth Kaza Blair Taylor Elizabeth K. Hawthorne Towson University Towson MD USA Union County College Cranford NJ USA
The CS 2013 curriculum includes Information Assurance and Security as a pervasive knowledge area. However, introducing security in lower level courses is challenging because of lack of appropriate teaching resources a... 详细信息
来源: 评论
Security Injections 2.0: Using Segmentation, Instant-feedback, and Auto-grading to Enhance secure coding Modules for Lower-level Programming Courses (Abstract Only)  15
Security Injections 2.0: Using Segmentation, Instant-feedbac...
收藏 引用
Proceedings of the 46th ACM Technical Symposium on Computer Science Education
作者: Sagar Raina Blair Taylor Siddharth Kaza Towson University Towson MD USA
Learning interventions based on modules are common in computer science education. Traditional learning modules that present a large amount of content in a linear format can induce cognitive overload in learners. We pr... 详细信息
来源: 评论
Detection and prevention of evasion attacks on machine learning models
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2025年 266卷
作者: Muthalagu, Raja Malik, Jasmita Pawar, Pranav M. BITS Pilani Dept Comp Sci Dubai U Arab Emirates
With the increasing use of machine learning models in critical applications such as image classification, natural language processing, and cybersecurity, there is a growing concern about the vulnerability of these mod... 详细信息
来源: 评论
Measurement of Embedding Choices on Cryptographic API Completion Tasks
收藏 引用
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY 2024年 第3期33卷 1-30页
作者: Xiao, Ya Song, Wenjia Ahmed, Salman Ge, Xinyang Viswanath, Bimal Meng, Na Yao, Danfeng (Daphne) Virginia Tech Blacksburg VA 24061 USA
In this article, we conduct a measurement study to comprehensively compare the accuracy impacts of multiple embedding options in cryptographic API completion tasks. Embedding is the process of automatically learning v... 详细信息
来源: 评论
Thriving in the era of hybrid work: Raising cybersecurity awareness using serious games in industry trainings☆
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2024年 210卷
作者: Zhao, Tiange Gasiba, Tiago Lechner, Ulrike -Albuquerque, Maria Pinto Siemens AG Otto Hahn Ring 6 D-81739 Munich Germany Univ Bundeswehr Munich Werner Heisenberg Weg 39 D-85579 Neubiberg Germany Inst Univ Lisboa IUL ISTAR ISCTE Ave Forcas Armadas P-1649026 Lisbon Portugal
The important missions of modern software engineering education are to prepare software engineers to work in a hybrid mode and to address the need to enable them to write secure code and deliver secure products and se... 详细信息
来源: 评论
A Study on the Optimization Method for the Rule Checker in the secure coding
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2014年 第1期8卷 333-342页
作者: Kim, JaeHyun Lee, YangSun Seokyeong Univ Dept Comp Engn 16-1 Jungneung Dong Seoul 136704 South Korea
Today's software allows data transfer with the use of internet. Therefore, there is always a threat of attack by hackers. These security weaknesses cause a critical economic loss which is a direct cause of softwar... 详细信息
来源: 评论
ValAsp: A Tool for Data Validation in Answer Set Programming
收藏 引用
THEORY AND PRACTICE OF LOGIC PROGRAMMING 2023年 第5期23卷 965-985页
作者: Alviano, Mario Dodaro, Carmine Zamayla, Arnel Univ Calabria Dept Math & Comp Sci Via P BucciCubo 30B I-87036 Arcavacata Di Rende CS Italy
The development of complex software requires tools promoting fail-fast approaches, so that bugs and unexpected behavior can be quickly identified and fixed. Tools for data validation may save the day of computer progr... 详细信息
来源: 评论
A Pilot Study on secure Code Generation with ChatGPT forWeb Applications  24
A Pilot Study on Secure Code Generation with ChatGPT forWeb ...
收藏 引用
Annual ACM Southeast Conference (ACMSE)
作者: Jamdade, Mahesh Liu, Yi Univ Massachusetts Dartmouth Dartmouth MA 02747 USA
Conversational Large Language Models (LLMs), such as ChatGPT, have demonstrated their potent capabilities in natural language processing tasks. This paper presents a pilot study that uses ChatGPT for generating web ap... 详细信息
来源: 评论
Rethinking Answer Set Programming Templates  26th
Rethinking Answer Set Programming Templates
收藏 引用
26th International Symposium on Practical Aspects of Declarative Languages (PADL)
作者: Alviano, Mario Ianni, Giovambattista Pacenza, Francesco Zangari, Jessica Univ Calabria DEMACS Via Bucci 30-B I-87036 Arcavacata Di Rende CS Italy
In imperative programming, the Domain-Driven Design methodology helps in coping with the complexity of software development by materializing in code the invariants of a domain of interest. Code is cleaner and more sec... 详细信息
来源: 评论