咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=secure coding"
89 条 记 录,以下是41-50 订阅
排序:
Efficient encryption of wavelet-based coded color images
收藏 引用
PATTERN RECOGNITION 2005年 第7期38卷 1111-1115页
作者: Martin, K Lukac, R Plataniotis, KN Univ Toronto Edward S Rogers Sr Dept ECE Multimedia Lab Toronto ON M5S 3G4 Canada
An efficient, secure color image coder incorporating Color-SPIHT (C-SPIHT) compression and partial encryption is presented. Confidentiality of the image data is achieved by encrypting only the significance bits of ind... 详细信息
来源: 评论
Systematic Detection of State Variable Corruptions in Discrete Event System Specification Based Simulation
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2020年 第7期E103D卷 1769-1772页
作者: Lee, Hae Young Kim, Jin Myoung Cheongju Univ Cheongju South Korea SKKU Seoul South Korea
In this letter, we propose a more secure modeling and simulation approach that can systematically detect state variable corruptions caused by buffer overflows in simulation models. Using our approach, developers may n... 详细信息
来源: 评论
Security Assessment by Google Hacking Automation Tools for the Web Sites of Korea and the USA Universities
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2015年 第5期9卷 163-173页
作者: Bae, Mi Young Lim, Hankyu Andong Natl Univ Dept Multimedia Engn Andong South Korea
As software exchanges data in the internet environment, it is always susceptible to the malicious attacks of hackers. Google Search enables individuals to randomly search servers with their preferred vulnerabilities u... 详细信息
来源: 评论
Sifu-a cybersecurity awareness platform with challenge assessment and intelligent coach
收藏 引用
Cybersecurity 2018年 第1期1卷 945-967页
作者: Tiago Espinha Gasiba Ulrike Lechner Maria Pinto-Albuquerque Siemens AG Corporate Technology Otto-Hahn-Rin 681379 MunichBavariaGermany Universitat der Bundeswehr München MunichGermany Instituto Universitario de Lisboa(ISCTE-IUL) ISTAR-IULLisbonPortugal
Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic *** handling of software vulnerabilities is essential in the industrial context,particularly when the software is deployed... 详细信息
来源: 评论
SACH: A Tool for Assisting secure Android Application Development
SACH: A Tool for Assisting Secure Android Application Develo...
收藏 引用
IEEE SoutheastCon Conference
作者: Abernathy, Aakiel Yuan, Xiaohong Hill, Edward Xu, Jinsheng Bryant, Kelvin Williams, Kenneth North Carolina Agr & Tech State Univ Dept Comp Sci Greensboro NC 27401 USA
To mitigate the risk of attacks to mobile applications, it is important for mobile application developers to develop secure mobile applications. There have been tools that statically analyze the mobile applications to... 详细信息
来源: 评论
Raising Security Awareness of Cloud Deployments using Infrastructure as Code through CyberSecurity Challenges  21
Raising Security Awareness of Cloud Deployments using Infras...
收藏 引用
16th International Conference on Availability, Reliability and Security (ARES)
作者: Gasiba, Tiago Espinha Andrei-Cristian, Iosif Lechner, Ulrike Pinto-Albuquerque, Maria Siemens AG T RDA CST SEL DE Munich Germany Tech Univ Munich Munich Germany Univ Bundeswehr Munchen Neubiberg Germany Inst Univ Lisboa ISCTE IUL ISTAR Lisbon Portugal
Improper deployment of software can have serious consequences, ranging from simple downtime to permanent data loss and data breaches. Infrastructure as Code tools serve to streamline delivery by promising consistency ... 详细信息
来源: 评论
A Pilot Study on secure Code Generation with ChatGPT forWeb Applications  24
A Pilot Study on Secure Code Generation with ChatGPT forWeb ...
收藏 引用
Annual ACM Southeast Conference (ACMSE)
作者: Jamdade, Mahesh Liu, Yi Univ Massachusetts Dartmouth Dartmouth MA 02747 USA
Conversational Large Language Models (LLMs), such as ChatGPT, have demonstrated their potent capabilities in natural language processing tasks. This paper presents a pilot study that uses ChatGPT for generating web ap... 详细信息
来源: 评论
Rethinking Answer Set Programming Templates  26th
Rethinking Answer Set Programming Templates
收藏 引用
26th International Symposium on Practical Aspects of Declarative Languages (PADL)
作者: Alviano, Mario Ianni, Giovambattista Pacenza, Francesco Zangari, Jessica Univ Calabria DEMACS Via Bucci 30-B I-87036 Arcavacata Di Rende CS Italy
In imperative programming, the Domain-Driven Design methodology helps in coping with the complexity of software development by materializing in code the invariants of a domain of interest. Code is cleaner and more sec... 详细信息
来源: 评论
Software Reengineering Based Security Teaching
Software Reengineering Based Security Teaching
收藏 引用
3rd International Multi-Conference on Engineering and Technological Innovation
作者: Chung, Sam Endicott-Popovsky, Barbara Univ Washington Inst Technol Comp & Software Syst Tacoma WA 98402 USA Univ Washington Ctr Informat Assurance & Cyber Secur Seattle WA 98195 USA
The problem of developing secure code is well known to high-tech sector companies. Some, like Microsoft, have found it necessary to establish ongoing security training for their developers to make up for the absence o... 详细信息
来源: 评论
Scalable and Reusable Attack Aware Software
Scalable and Reusable Attack Aware Software
收藏 引用
ASE International Conference on BioMedical Computing (BioMedCom)
作者: Kim, William Moon, Cheolmin Sky Chung, Sam Escrig, Teresa Endicott-Popovsky, Barbara Univ Washington Tacoma Inst Technol Tacoma WA 98402 USA Univ Washington Ctr Informat Assurance & Cybersecur Seattle WA 98105 USA
Developing and maintaining security software systems can be cost-prohibitive for all but the largest organizations. New requirements of hardware and software quickly outdate current security systems. Modern software a... 详细信息
来源: 评论