咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=secure coding"
89 条 记 录,以下是51-60 订阅
排序:
Student Centric Design for Cyber Security Knowledge Empowerment  2012
Student Centric Design for Cyber Security Knowledge Empowerm...
收藏 引用
IEEE International Conference on Technology Enhanced Education (ICTEE)
作者: Joshi, Avinash Ramani, Varrun Murali, Hrishikesh Krishnan, Radhesh Mithra, Zubin Pavithran, Vipin Amrita Centre for Cybersecurity India
Basics of computer science and engineering are a part of every major curriculum taught in colleges and universities across India. Numerous Indian websites are compromised frequently mainly due to insecure coding pract... 详细信息
来源: 评论
An Approach for Reduce Vulnerabilities in Web Information Systems  2nd
An Approach for Reduce Vulnerabilities in Web Information Sy...
收藏 引用
2nd Conference on Computational Methods in Systems and Software (CoMeSySo)
作者: Leite, Gleidson Sobreira Albuquerque, Adriano Bessa Univ Fortaleza Fortaleza Ceara Brazil
The evolution of the Internet has brought a significant change in the evolution of software, resulting in an increasing presence of Information Systems in Web environments and, consequently, an increase in security vu... 详细信息
来源: 评论
Locating SQL Injection Vulnerabilities in Java Byte Code using Natural Language Techniques
Locating SQL Injection Vulnerabilities in Java Byte Code usi...
收藏 引用
IEEE SoutheastCon Conference
作者: Jackson, Kevin A. Bennett, Brian T. East Tennessee State Univ Dept Comp Johnson City TN 37614 USA
With so much our daily lives relying on digital devices like personal computers and cell phones, there is a growing demand for code that not only functions properly, but is secure and keeps user data safe. However, en... 详细信息
来源: 评论
A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments  1
收藏 引用
1st International Conference on Ubiquitous Security (UbiSec)
作者: Iosif, Andrei-Cristian Gasiba, Tiago Espinha Zhao, Tiange Lechner, Ulrike Pinto-Albuquerque, Maria Tech Univ Munich Munich Germany Siemens AG Munich Germany Univ Bundeswehr Munchen Neubiberg Germany Inst Univ Lisboa ISCTE IUL ISTAR Lisbon Portugal
As cloud deployments are becoming ubiquitous, the rapid adoption of this new paradigm may potentially bring additional cyber security issues. It is crucial that practitioners and researchers pose questions about the c... 详细信息
来源: 评论
OpenOSC: Open Source Object Size Checking Library With Built-in Metrics
OpenOSC: Open Source Object Size Checking Library With Built...
收藏 引用
IEEE secure Development Conference (IEEE SecDev)
作者: Han, Yongkui Shah, Pankil Van Nguyen Ma, Ling Livingston, Richard Cisco Syst Boxboro MA 01719 USA Cisco Syst Knoxville TN USA
OpenOSC provides value to software development in detecting destination buffer overruns and source buffer over-reads. OpenOSC is presented as open, extensible, object size checking (OSC) library written in C that inte... 详细信息
来源: 评论
Can gamification help to teach Cybersecurity?  20
Can gamification help to teach Cybersecurity?
收藏 引用
20th International Conference on Information Technology Based Higher Education and Training (ITHET)
作者: Berisford, Christopher J. Blackburn, Leighton Ollett, Jennifer M. Tonner, Thomas B. Yuen, Chun San Hugh Walton, Ryan Olayinka, Olakunle Univ Sheffield Dept Comp Sci Sheffield England
Over the last decade, there has been an increase in the number of attacks on web applications. The proliferation of these attacks is partially a result of increased adoption of IT systems in organisations and the incr... 详细信息
来源: 评论
Code Obfuscation Technique for Enhancing Software Protection Against Reverse Engineering  2nd
Code Obfuscation Technique for Enhancing Software Protection...
收藏 引用
2nd International Conference of Artificial Intelligence, Medical Engineering, Education (AIMEE)
作者: Gnatyuk, Sergiy Kinzeryavyy, Vasyl Stepanenko, Iryna Gorbatyuk, Yana Gizun, Andrii Kotelianets, Vitalii Natl Aviat Univ Kiev Ukraine
Software reliability is an actual problem caused with absence of software protection techniques, especially absence of software code protection from reverse engineering. Computer piracy and illegal software usage make... 详细信息
来源: 评论
Developer-Proof Prevention of SQL Injections  13th
Developer-Proof Prevention of SQL Injections
收藏 引用
13th International Symposium on Foundations and Practice of Security (FPS)
作者: Courant, Judicael Orange Cyberdefense Lyon France
SQL queries, when written by unskilled or hurried developers for web applications, are prone to SQL injections. We propose an alternative approach for querying SQL databases that does not suffer from this flaw. Our ap... 详细信息
来源: 评论
Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels
Empirical Analysis of Software Vulnerabilities Causing Timin...
收藏 引用
IEEE Conference on Communications and Network Security (CNS)
作者: Kholoosi, M. Mehdi Babar, M. Ali Yilmaz, Cemal Univ Adelaide CREST Sch Comp Sci Adelaide SA Australia Cyber Secur Cooperat Res Ctr Adelaide SA Australia Sabanci Univ Fac Engn & Nat Sci TR-34956 Istanbul Turkiye
Timing attacks are considered one of the most damaging side-channel attacks. These attacks exploit timing fluctuations caused by certain operations to disclose confidential information to an attacker. For instance, in... 详细信息
来源: 评论
Web Cryptography API: Prevalence and Possible Developer Mistakes  22
Web Cryptography API: Prevalence and Possible Developer Mist...
收藏 引用
17th International Conference on Availability, Reliability and Security (ARES)
作者: Wichmann, Pascal Blochberger, Maximilian Federrath, Hannes Univ Hamburg Secur Distributed Syst Hamburg Germany
In this paper, we analyze mistakes that web developers can make when using the Web Cryptography API. We evaluate the impact of the uncovered mistakes and discuss how they can be prevented. Furthermore, we derive best ... 详细信息
来源: 评论