咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 10 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 仪器科学与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 12 篇 教育学
    • 12 篇 教育学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 89 篇 secure coding
  • 19 篇 cybersecurity
  • 16 篇 security
  • 8 篇 security injecti...
  • 8 篇 cs1
  • 7 篇 cs0
  • 7 篇 industry
  • 6 篇 hacker curriculu...
  • 6 篇 cs2
  • 6 篇 training
  • 5 篇 laboratory exerc...
  • 4 篇 serious games
  • 4 篇 education
  • 4 篇 cloud computing
  • 4 篇 web application ...
  • 4 篇 capture-the-flag
  • 3 篇 information syst...
  • 3 篇 java
  • 3 篇 game analysis
  • 3 篇 awareness

机构

  • 10 篇 towson universit...
  • 7 篇 union county col...
  • 4 篇 towson univ tows...
  • 4 篇 siemens ag munic...
  • 4 篇 the evergreen st...
  • 4 篇 lewis and clark ...
  • 3 篇 univ bundeswehr ...
  • 2 篇 sri internationa...
  • 2 篇 univ bundeswehr ...
  • 2 篇 inst univ lisboa...
  • 2 篇 tech univ munich...
  • 1 篇 univ washington ...
  • 1 篇 siemens ag corpo...
  • 1 篇 the university o...
  • 1 篇 stevens inst tec...
  • 1 篇 stephen f. austi...
  • 1 篇 towson univ dept...
  • 1 篇 bits pilani dept...
  • 1 篇 dankook univ dep...
  • 1 篇 shiraz univ sch ...

作者

  • 12 篇 blair taylor
  • 9 篇 siddharth kaza
  • 8 篇 lechner ulrike
  • 6 篇 pinto-albuquerqu...
  • 5 篇 taylor blair
  • 5 篇 richard weiss
  • 5 篇 elizabeth hawtho...
  • 5 篇 jens mache
  • 4 篇 gasiba tiago esp...
  • 3 篇 gasiba tiago
  • 3 篇 michael e. locas...
  • 3 篇 endicott-popovsk...
  • 3 篇 chung sam
  • 3 篇 elizabeth k. haw...
  • 3 篇 chattopadhyay an...
  • 2 篇 zhao tiange
  • 2 篇 albuquerque adri...
  • 2 篇 ambareen siraj
  • 2 篇 leite gleidson s...
  • 2 篇 sagar raina

语言

  • 86 篇 英文
  • 3 篇 其他
检索条件"主题词=secure coding"
89 条 记 录,以下是81-90 订阅
排序:
Is the OWASP Top 10 List Comprehensive Enough for Writing secure Code?  2020
Is the OWASP Top 10 List Comprehensive Enough for Writing Se...
收藏 引用
Proceedings of the 2020 International Conference on Big Data in Management
作者: Parth Sane Rochester Institute of Technology
The OWASP Top 10 is a list that is published by the Open Web Application Security Project (OWASP). The general purpose is to serve as a watchlist for bugs to avoid while writing code. This paper compares how many of t... 详细信息
来源: 评论
Teaching Security Using Hands-on Exercises in 2015 (Abstract Only)  15
Teaching Security Using Hands-on Exercises in 2015 (Abstract...
收藏 引用
Proceedings of the 46th ACM Technical Symposium on Computer Science Education
作者: Richard Weiss Michael Locasto Jens Mache Blair Taylor Elizabeth Hawthorne Justin Cappos Ambereen Siraj The Evergreen State College Olympia WA USA The University of Calgary Calgary AB Canada Lewis & Clark College Portland OR USA Towson University Towson MD USA Union County College Cranford NJ USA New York University New York NY USA Tennessee Technical University Cookeville TN USA
We see teaching cybersecurity through hands-on, interactive exercises as a way to engage students. Some of the exercises that we have seen require significant preparation on the part of the instructor. Having a commun... 详细信息
来源: 评论
Locating SQL Injection Vulnerabilities in Java Byte Code using Natural Language Techniques
Locating SQL Injection Vulnerabilities in Java Byte Code usi...
收藏 引用
IEEE SoutheastCon
作者: Kevin A. Jackson Brian T. Bennett Department of Computing East Tennessee State University Johnson City TN USA
With so much our daily lives relying on digital devices like personal computers and cell phones, there is a growing demand for code that not only functions properly, but is secure and keeps user data safe. However, en... 详细信息
来源: 评论
Discussion of Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2019  19
Discussion of Integrating Hands-on Cybersecurity Exercises i...
收藏 引用
Proceedings of the 50th ACM Technical Symposium on Computer Science Education
作者: Richard Weiss Jens Mache Blair Taylor Siddharth Kaza Ankur Chattopadhyay Evergreen State College Olympia WA USA Lewis and Clark College Portland OR USA Towson University Towson MD USA University of Wisconsin at Green Bay Green Bay WI USA
The critical shortage of cyber security professionals remains an unsolved problem. We need to greatly expand the community in order to meet the increasing demand. The number of security-focused competitions and exerci... 详细信息
来源: 评论
Assessment of Security Knowledge, Skills and Abilities using Hands-On Exercises in 2016 (Abstract Only)  16
Assessment of Security Knowledge, Skills and Abilities using...
收藏 引用
Proceedings of the 47th ACM Technical Symposium on Computing Science Education
作者: Richard Weiss MIchael E. Locasto Jens Mache Blair Taylor Elizabeth Hawthorne Siddharth Kaza Ambareen Siraj The Evergreen State College Olympia WA USA University of Calgary Calgary AB Canada Lewis and Clark College Portland OR USA Towson University Towson MD USA Union County College Cranford NJ USA Tennessee Tach University Cookeville TN USA
We see teaching cybersecurity through hands-on, interactive exercises as a way to engage students. However, we also want to assess how much students are learning from these exercises, and the exercises themselves coul... 详细信息
来源: 评论
Embedding security into visual programming courses  11
Embedding security into visual programming courses
收藏 引用
Proceedings of the 2011 Information Security Curriculum Development Conference
作者: Myung Ah Park University of Central Oklahoma Edmond OK
A visual programming course can be set up in a way that draws a general audience from different disciplines in addition to serving majors. Thereby embedding security into a visual programming course can be effective n... 详细信息
来源: 评论
Hello world!: code responsibly: why cyber is a game changer for computer science education  20
Hello world!: code responsibly: why cyber is a game changer ...
收藏 引用
Proceedings of the 9th Computer Science Education Research Conference
作者: Blair Taylor Towson University
Cybersecurity continues to be a global crisis. The ever-growing need for cyber talent has challenged universities to build and expand cybersecurity programs, despite an acute shortage of cybersecurity *** every challe... 详细信息
来源: 评论
Hands-on Cybersecurity Exercises That are Easy to Access and Assess (Abstract Only)  17
Hands-on Cybersecurity Exercises That are Easy to Access and...
收藏 引用
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education
作者: Richard Weiss Jens Mache Michael E. Locasto Frankly Turbak The Evergreen State College Olympia WA USA Lewis and Clark College Portland OR USA SRI International New York NY USA Wellesley College Wellesley MA USA
Cybersecurity is a topic of growing interest for CS educators. The goal of this workshop is to empower faculty to add hands-on security exercises to their courses. We introduce EDURange, a framework for accessing, dev... 详细信息
来源: 评论
Teaching safe coding via comparative languages
Journal of Computing Sciences in Colleges
收藏 引用
Journal of Computing Sciences in Colleges 2017年 第4期32卷
作者: David A. Cook Anne Marie Eubanks Stephen F. Austin State University
We recently taught a Special Projects course aimed at introducing students into writing safe code - code that would be robust and reliable in embedded or real-time applications. This paper is a synopsis of the experie... 详细信息
来源: 评论