咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=secure coding"
89 条 记 录,以下是61-70 订阅
排序:
Scaffolded Live coding: A Hybrid Pedagogical Approach for Enhanced Teaching of coding Skills
Scaffolded Live Coding: A Hybrid Pedagogical Approach for En...
收藏 引用
IEEE Frontiers in Education Conference (FIE)
作者: Chattopadhyay, Ankur Ryan, Drew Pockrandt, James Northern Kentucky Univ Dept Comp Sci Highland Hts KY 41076 USA Univ Wisconsin Dept Comp Sci Green Bay WI USA
This Full paper in the Innovative Practice Category describes a novel research study that is based upon an experimental scaffolding of live coding techniques used towards teaching a traditional face to face undergrad ... 详细信息
来源: 评论
Mining Cryptography Misuse in Online Forums  2
Mining Cryptography Misuse in Online Forums
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)
作者: Braga, Alexandre Dahab, Ricardo State Univ Campinas UNICAMP Inst Comp Campinas SP Brazil
This work analyzes cryptography misuse by software developers, from their contributions to online forums on cryptography-based security and cryptographic programming. We studied three popular forums: Oracle Java Crypt... 详细信息
来源: 评论
secure Modules for Undergraduate Software Engineering Courses  48
Secure Modules for Undergraduate Software Engineering Course...
收藏 引用
48th IEEE Frontiers in Education Conference (FIE)
作者: Yang, Jeong Lodgher, Akhtar Lee, Young Texas A&M Univ Comp & Cyber Secur San Antonio TX 78224 USA
Security affects every software component in different types of computing systems. Many vulnerabilities and attacks on software systems are due to security weaknesses in the software itself. During the process of soft... 详细信息
来源: 评论
Designing a Serious Game: Teaching Developers to Embed Privacy into Software Systems  35
Designing a Serious Game: Teaching Developers to Embed Priva...
收藏 引用
35th IEEE/ACM International Conference on Automated Software Engineering (ASE)
作者: Arachchilage, Nalin Asanka Gamagedara Hameed, Mumtaz Abdul La Trobe Univ Bundoora Vic Australia Technovat Consulting & Amp Training PVT Male Maldives
Software applications continue to challenge user privacy when users interact with them. Privacy practices (e.g. Data Minimisation (DM), Privacy by Design (PbD) or General Data Protection Regulation (GDPR)) and related... 详细信息
来源: 评论
A Study on the Evaluation System through Software Weakness Analysis  11
A Study on the Evaluation System through Software Weakness A...
收藏 引用
Joint 11th International Conference on Soft Computing and Intelligent Systems and 21st International Symposium on Advanced Intelligent Systems (SCIS-ISIS)
作者: Kim, Kyung-won Chang, Seokmin Park, Kyubin Son, Yunsik Dongguk Univ Dept Comp Sci & Engn Seoul South Korea
Recently, Due to the rapid development of IT technology the software in the social infrastructure is increasing. However, cyber attacks that exploit software vulnerabilities are also increasing. This paper designed an... 详细信息
来源: 评论
VaultBox: Enhancing the Security and Effectiveness of Security Analytics  5th
VaultBox: Enhancing the Security and Effectiveness of Securi...
收藏 引用
5th International Conference on Science of Cyber Security (SciSec)
作者: Trivedi, Devharsh Triandopoulos, Nikos Stevens Inst Technol Hoboken NJ 07030 USA
Security tools like Firewalls, IDS, IPS, SIEM, EDR, and NDR effectively detect and block threats. However, these tools depend on the system, application, and event logs. Logs are the key ingredient for various purpose... 详细信息
来源: 评论
Minimizing Cognitive Overload in Cybersecurity Learning Materials: An Experimental Study Using Eye-Tracking  14th
Minimizing Cognitive Overload in Cybersecurity Learning Mate...
收藏 引用
14th IFIP WG 11.8 World Conference on Information Security Education (WISE)
作者: Bernard, Leon Raina, Sagar Taylor, Blair Kaza, Siddharth Towson Univ Dept Comp & Informat Sci Baltimore MD 21252 USA Mt St Mary Coll Div Maths & Informat Technol Newburgh NY USA
Cybersecurity education is critical in addressing the global cyber crisis. However, cybersecurity is inherently complex and teaching cyber can lead to cognitive overload among students. Cognitive load includes: 1) int... 详细信息
来源: 评论
Support for secure Code Execution in Unix-Like Operating Systems  12
Support for Secure Code Execution in Unix-Like Operating Sys...
收藏 引用
12th International Conference on Cyber Warfare and Security (ICCWS)
作者: Bhuse, Vijay Nandigam, Jagadeesh Grand Valley State Univ Sch Comp & Informat Syst Allendale MI 49401 USA
FreeBSD and OpenBSD are BSD-based Unix-like operating systems. OpenBSD is one of the most secure operating systems. We review various secure coding technologies and processes that were invented and implemented by the ... 详细信息
来源: 评论
The Importance of Safe coding Practices and Possible Impacts on the Lack of Their Application  8th
The Importance of Safe Coding Practices and Possible Impacts...
收藏 引用
8th Computer Science On-Line Conference (CSOC)
作者: Leite, Gleidson Sobreira Albuquerque, Adriano Bessa Univ Fortaleza Fortaleza CE Brazil
A significant change in the way organizations and companies use software has been brought by the evolution of the Internet over the time, resulting in an increasing presence of Information Systems in Web environments ... 详细信息
来源: 评论
Securing Web Applications: Web Application Flow Whitelisting to Improve Security
Securing Web Applications: Web Application Flow Whitelisting...
收藏 引用
作者: Alabdulrazzaq, Haneen Khalid Auburn University
学位级别:Ph.D., Doctor of Philosophy
The explosion in the availability of data fueled by mobile devices has pushed security to the forefront. As of 2016, Internet users worldwide are estimated at a staggering 3.47 billion. Such large numbers of users dic... 详细信息
来源: 评论