Search

Your search keyword '"Software assurance"' showing total 385 results

Search Constraints

Start Over You searched for: Descriptor "Software assurance" Remove constraint Descriptor: "Software assurance"
385 results on '"Software assurance"'

Search Results

1. Blockchain Handshaking with Software Assurance: Version++ Protocol for Bitcoin Cryptocurrency †.

4. Distributed and Lightweight Software Assurance in Cellular Broadcasting Handshake and Connection Establishment †.

7. High Assurance Software for Financial Regulation and Business Platforms

8. The Use of Gamification to Enhance Internal Software Quality - Structured Literature Analysis.

9. Blockchain Smart Contracts Static Analysis for Software Assurance

10. An In-Depth Security Assessment of Maritime Container Terminal Software Systems

12. On the Verification of Software Vulnerabilities During Static Code Analysis Using Data Mining Techniques : (Short Paper)

13. A Thought Experiment on Evolution of Assurance Cases : —from a Logical Aspect

15. The Technical Landscape of Ransomware: Threat Models and Defense Models

16. Guide to Securing Scientific Software

17. A Comprehensive Safety Lifecycle

20. Applying Software Assurance and Cybersecurity NICE Job Tasks through Secure Software Engineering Labs.

21. A MODEL GRADUATE ENTERPRISE SECURITY COURSE.

23. Validating Code-Level Behavior of Dynamic Adaptive Systems in the Face of Uncertainty

27. Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases

28. Towards a Tool for Generating Aspects from MEDL and PEDL Specifications for Runtime Verification

30. A Distributed 'Black Box' Audit Trail Design Specification for Connected and Automated Vehicle Data and Software Assurance

31. Enki

32. Mobile Software Assurance Informed through Knowledge Graph Construction: The OWASP Threat of Insecure Data Storage

33. Towards supporting software assurance assessments by detecting security patterns

34. SOFTWARE ASSURANCE: THE THINGS A MANAGER NEEDS TO KNOW

35. Survey of software assurance

36. Proposed approach to predict software faults detection using Entropy

37. Vulnerability Prediction From Source Code Using Machine Learning

38. Input Space Coverage Matters

39. Concepts of Safety Critical Systems Unification Approach & Security Assurance Process

40. Weakness in Depth: A Voting Machine's Demise.

41. Introducing Combinatorial Testing in a Large Organization.

42. An Automated Test Generation Technique for Software Quality Assurance.

43. Could What Happened to Sony Happen to Us?

44. The United States Department of Defense revitalization of system security engineering through program protection.

45. Application stress testing Achieving cyber security by testing cyber attacks.

46. Introducing safety cases for health IT.

47. Foundations for Software Assurance.

48. Towards overcoming human analyst fallibility in the requirements tracing process.

49. The Strategies for Critical Cyber Infrastructure (CCI) Protection by Enhancing Software Assurance.

50. Security Assessment Techniques for Software Assurance -- a "Virtual Team" Approach.

Catalog

Books, media, physical & digital resources