Search

Your search keyword '"COMPUTER software security"' showing total 169 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER software security" Remove constraint Descriptor: "COMPUTER software security" Topic computer security Remove constraint Topic: computer security
169 results on '"COMPUTER software security"'

Search Results

1. CPL-Net: A Malware Detection Network Based on Parallel CNN and LSTM Feature Fusion.

2. A machine learning approach for digital watermarking.

3. Context-Based Support to Enhance Developers' Learning of Software Security.

4. Fuzzing: Hack, Art, and Science.

5. Survey of Approaches and Techniques for Security Verification of Computer Systems.

6. How to live in a post-meltdown and -spectre world.

7. Formally Verified Software in the Real World.

8. A Vulnerable System: The History of Information Security in the Computer Age by Andrew Stewart (review).

9. Hiding Secrets in Software: A Cryptographic Approach to Program Obfuscation.

10. Privacy and Security Putting Trust in Security Engineering: Proposing a stronger foundation for an engineering discipline to support the design of secure systems.

11. Hacker Behavior, Network Effects, and the Security Software Market.

12. Designing User Incentives for Cybersecurity.

13. Microsoft to Release Security AI Product to Help Clients Track Hackers.

14. Trendbeitrag Security.

15. Toward More Secure Software.

17. An Integration of Threat Modeling with Attack Pattern and Misuse Case for Effective Security Requirement Elicitation.

18. The practice of secure software development in SDLC: an investigation through existing model and a case study.

19. Combinatorial Methods in Security Testing.

20. Traffic classification for managing Applications' networking profiles.

22. A uniform approach for access control and business models with explicit rule realization.

23. Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.

24. FIXING YOUR FLAWS: Why companies are failing to manage vulnerabilities in critical systems and applications.

25. Four Software Security Findings.

26. Security risk analysis of system changes exemplified within the oil and gas domain.

27. The Need for Measuring the Quality of Application Security.

28. Enhancing Software Engineering Education: Teaching Software Security Requirements and Design.

29. Software Security Test Data Generation Based on Genetic Algorithms.

30. Security Requirements Engineering; State of the Art and Research Challenges.

31. Gauging the Impact of FISMA on Software Security.

32. A Method for Memory Integrity Authentication Based on Bloom Filter.

33. An Empirical Validation of Object Oriented Design Security Quantification Model.

34. The real threats revealed.

35. Novel Secure Code Encryption Techniques Using Crypto Based Indexed Table for Highly Secured Software.

36. Cyber War is Inevitable (Unless We Build Security In).

37. Code Analysis for Software and System Security Using Open Source Tools.

38. SECURITY MONITORS FOR JAVA PROGRAMS WITH MPL.

39. Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities

40. Efficient file fuzz testing using automated analysis of binary file format

41. Semiotics 101: Taking the Printed Matter Doctrine Seriously.

42. Software security analysis and assessment model for the web-based applications.

43. A METHOD TO PROTECT COMPUTER PROGRAMS: THE INTEGRATION OF COPYRIGHT, TRADE SECRETS, AND ANTICIRCUMVENTION MEASURES.

44. Practical Security Issues for a Real Case Application.

45. New AspectJ Pointcuts for Integer Overflow and Underflow Detection.

46. Security Requirements Engineering: A Framework for Representation and Analysis.

47. THE LAW AND ECONOMICS OF SOFTWARE SECURITY.

48. Proactive Security: Build Stuff Right the First Time.

49. Can a Badness-ometer Address Third-Party Software?

50. Software Diversity for Future Systems Security.

Catalog

Books, media, physical & digital resources