Search

Your search keyword '"COMPUTER software security"' showing total 78 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER software security" Remove constraint Descriptor: "COMPUTER software security" Publisher association for computing machinery Remove constraint Publisher: association for computing machinery
78 results on '"COMPUTER software security"'

Search Results

1. The Security Jawbreaker.

2. Deep Domain Adaptation With Max-Margin Principle for Cross-Project Imbalanced Software Vulnerability Detection.

3. A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems.

4. Vision Transformer Inspired Automated Vulnerability Repair.

5. Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel Attacks.

6. Learning to Detect Memory-related Vulnerabilities.

7. Developer Ecosystems for Software Safety: Continuous assurance at scale.

8. A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software Development.

9. Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis.

10. CSRB's Opus One: Comments on the Cyber Safety Review Board Log4j Event Report.

11. Android Source Code Vulnerability Detection: A Systematic Literature Review.

12. TAG: Tagged Architecture Guide.

13. The Ethics of Zero-Day Exploits--The NSA Meets the Trolley Car.

14. Fuzzing: Hack, Art, and Science.

15. Survey of Approaches and Techniques for Security Verification of Computer Systems.

16. Firmware Over-the-air Programming Techniques for IoT Networks - A Survey.

17. The Top 10 Things Executives Should Know About Software.

18. How to live in a post-meltdown and -spectre world.

19. Formally Verified Software in the Real World.

20. Low-overhead Hardware Supervision for Securing an IoT Bluetooth-enabled Device: Monitoring Radio Frequency and Supply Voltage.

21. Editorial: Toward the Future with Eight Issues Per Year.

22. Hiding Secrets in Software: A Cryptographic Approach to Program Obfuscation.

23. Friendly Fire: Cross-app Interactions in IoT Platforms.

24. Privacy and Security Putting Trust in Security Engineering: Proposing a stronger foundation for an engineering discipline to support the design of secure systems.

25. Analyzing Dynamic Code: A Sound Abstract Interpreter for Evil Eval.

26. Exploiting Mixed Binaries.

27. The Tip of the Iceberg: On the Merits of Finding Security Bugs.

28. Designing User Incentives for Cybersecurity.

29. Assisted discovery of software vulnerabilities.

30. ReGuard.

31. A Survey of Symbolic Execution Techniques.

32. Toward More Secure Software.

33. Managing Assurance Cases in Model Based Software Systems.

34. A Game-Theoretic Decision-Making Framework for Engineering Self-Protecting Software Systems.

35. Analysis of JavaScript Web Applications Using SAFE 2.0.

36. acm forum.

37. MUST and MUST NOT.

38. Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.

39. Editorial: A Retrospective and Prospective Reflection.

40. Frama-C: A software analysis perspective.

41. Semantic Smells and Errors in Access Control Models: A Case Study in PHP.

42. Vulnerability of the Day: Concrete Demonstrations for Software Engineering Undergraduates.

43. Give Me Code Access.

45. A Semantics-Based Approach to Malware Detection.

46. User Interfaces for Privacy Agents.

47. Certificate Transparency.

48. State of the systems security.

49. Identifying security issues in software development.

50. Knowledge-enriched security and privacy threat modeling.

Catalog

Books, media, physical & digital resources