咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=secure coding"
89 条 记 录,以下是71-80 订阅
排序:
Try-CybSI: An Extensible Cybersecurity Learning and Demonstration Platform  17
Try-CybSI: An Extensible Cybersecurity Learning and Demonstr...
收藏 引用
18th Annual Conference on Information Technology Education (SIGITE) / 6th Annual Conference on Research in Information Technology (RIIT)
作者: Kalyanam, Rajesh Yang, Baijian Purdue Univ Res Comp W Lafayette IN 47907 USA Purdue Polytech Inst Dept Comp & Informat Technol W Lafayette IN 47907 USA
The increasing use of web applications for tasks such as banking, social media, and travel reservations and the frequent news of hacker attacks has brought cybersecurity to the forefront of public discussion. It is vi... 详细信息
来源: 评论
Study on the Principle and Defense of Buffer Overflow Attacks
Study on the Principle and Defense of Buffer Overflow Attack...
收藏 引用
4th International Conference on Graphic and Image Processing (ICGIP)
作者: Lin, Wang Beijing City Univ Network Informat Ctr Beijing Peoples R China
Buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area. With specific programs, this paper describes in detail the type o... 详细信息
来源: 评论
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018  18
Integrating Hands-on Cybersecurity Exercises into the Curric...
收藏 引用
49th ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE)
作者: Weiss, Richard Siraj, Ambareen Mache, Jens Taylor, Blair Kozo, Siddharth Chattopadhyay, Ankur Locasto, Michael E. Evergreen State Coll Olympia WA 98505 USA Tennessee Technol Univ Cookeville TN USA Lewis & Clark Coll Portland OR 97219 USA Towson Univ Towson MD USA Univ Wisconsin Green Bay WI 54302 USA SRI Int 333 Ravenswood Ave Menlo Pk CA 94025 USA
We need to greatly expand the community of faculty teaching cybersecurity using hands-on exercises. The number of security-focused competitions and exercises has increased in recent years so that faculty need to choos... 详细信息
来源: 评论
Extracting Cryptographic Keys *** Applications
收藏 引用
Semiconductor Science and Information Devices 2021年 第2期3卷 1-11页
作者: Shaun Mc Brearty william Farrelly Kevin Curran Institute of Technology SligoIreland Letterkenny Institute of Technology LetterkennyIreland Ulster University DerryUnited Kingdom
In the absence of specialized encryption hardware,cryptographic operationsmust be performed in main *** such,it is common place for cybercriminals to examine the content of main memory with a view to retrievinghigh-va... 详细信息
来源: 评论
Cybersecurity Challenges in Industry: Measuring the Challenge Solve Time to Inform Future Challenges
收藏 引用
INFORMATION 2020年 第11期11卷 533页
作者: Espinha Gasiba, Tiago Lechner, Ulrike Pinto-Albuquerque, Maria Siemens AG D-81379 Munich Germany Univ Bundeswehr Munchen Inst Angew Informat D-85579 Neubiberg Germany Inst Univ Lisboa ISCTE IUL ISTAR IUL Dept Ciencias & Tecnol Informacao P-1649026 Lisbon Portugal
Cybersecurity vulnerabilities in industrial control systems have been steadily increasing over the last few years. One possible way to address this issue is through raising the awareness (through education) of softwar... 详细信息
来源: 评论
Interactive e-learning modules for teaching secure: a pilot study (abstract only)  14
Interactive e-learning modules for teaching secure: a pilot ...
收藏 引用
Proceedings of the 45th ACM technical symposium on Computer science education
作者: Sagar Raina Blair Taylor Siddharth Kaza Towson University Towson MD USA
Addressing the crucial need for cybersecurity learning materials, the Security Injections @ Towson project (***/securityinjections) has developed modules for CS0, CS1, CS2 and Computer Literacy courses that target key... 详细信息
来源: 评论
Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only)  17
Building and Supporting a Community of CS Educators Teaching...
收藏 引用
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education
作者: Richard Weiss Ambareen Siraj Jens Mache Elizabeth Hawthorne Blair Taylor Siddharth Kaza Michael E. Locasto The Evergreen State College Olympia WA USA Tennessee Tech University Cookeville TN USA Lewis and Clark College Portland OR USA Union County College Cranford NJ USA Towson University Towson MD USA SRI International New York NY USA
We have been teaching cybersecurity using hands-on, interactive exercises that have successfully engaged students. However, in order to meet the increasing demand for security professionals, we need to greatly expand ... 详细信息
来源: 评论
Scalable and Reusable Attack Aware Software
Scalable and Reusable Attack Aware Software
收藏 引用
ASE/IEEE International Conference on BioMedical Computing (BioMedCom)
作者: William Kim Cheolmin Sky Moon Sam Chung Teresa Escrig Barbara Endicott-Popovsky Institute of Technology University of Washington Tacoma Tacoma WA USA Center for Information Assurance and Cybersecurity University of Washington Seattle Seattle WA USA
Developing and maintaining security software systems can be cost-prohibitive for all but the largest organizations. New requirements of hardware and software quickly outdate current security systems. Modern software a... 详细信息
来源: 评论
OPTIMAL COMMUNICATION OF REAL TIME DATA ON secure CDMA IP RAN NETWORK
OPTIMAL COMMUNICATION OF REAL TIME DATA ON SECURE CDMA IP RA...
收藏 引用
International Conference on Signal Processing, Communication, Power and Embedded System
作者: E. Venkat Reddy K. Srinivasa Rao ECE BIET R.R Dist Hyderabad Telangana-India ECE DRK Institute of Science & Technology R.R Dist Hyderabad Telangana-India
This paper presents an optimal and secure communication of real time data over a CDMA based IP RAN network. In the process of data transmission, a new coding approach for security enhancement and quality improvement b... 详细信息
来源: 评论
Designing a serious game: teaching developers to embed privacy into software systems  20
Designing a serious game: teaching developers to embed priva...
收藏 引用
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering
作者: Nalin Asanka Gamagedara Arachchilage Mumtaz Abdul Hameed La Trobe University Australia Technovation Consulting & Training PVT
Software applications continue to challenge user privacy when users interact with them. Privacy practices (e.g. Data Minimisation (DM), Privacy by Design (PbD) or General Data Protection Regulation (GDPR)) and related... 详细信息
来源: 评论