Found: 23
Select item for more details and to access through your institution.
Addressing Security and Privacy Risks in Mobile Applications.
- Published in:
- IT Professional, 2012, v. 14, n. 5, p. 28, doi. 10.1109/MITP.2012.72
- By:
- Publication type:
- Article
A hybrid scheme for securing fingerprint templates.
- Published in:
- International Journal of Information Security, 2010, v. 9, n. 5, p. 353, doi. 10.1007/s10207-010-0114-1
- By:
- Publication type:
- Article
Bad and good news about using software assurance tools.
- Published in:
- Software: Practice & Experience, 2017, v. 47, n. 1, p. 143, doi. 10.1002/spe.2401
- By:
- Publication type:
- Article
SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/8690853
- By:
- Publication type:
- Article
Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/8093578
- By:
- Publication type:
- Article
SECURITY EVALUATION IN COLLABORATIVE M-LEARNING SYSTEMS.
- Published in:
- Journal of Applied Quantitative Methods, 2010, v. 5, n. 4, p. 527
- By:
- Publication type:
- Article
Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things.
- Published in:
- Sensors (14248220), 2017, v. 17, n. 10, p. 2348, doi. 10.3390/s17102348
- By:
- Publication type:
- Article
The Need for Measuring the Quality of Application Security.
- Published in:
- Software Quality Professional, 2015, v. 17, n. 2, p. 30
- By:
- Publication type:
- Article
ENHANCING UML WITH SECURITY.
- Published in:
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2016, v. 19, n. 2, p. 468, doi. 10.21279/1454-864X-16-I2-070
- By:
- Publication type:
- Article
Aspectizing Java Access Control.
- Published in:
- IEEE Transactions on Software Engineering, 2012, v. 38, n. 1, p. 101, doi. 10.1109/TSE.2011.6
- By:
- Publication type:
- Article
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies.
- Published in:
- IEEE Transactions on Software Engineering, 2008, v. 34, n. 1, p. 50, doi. 10.1109/TSE.2007.70742
- By:
- Publication type:
- Article
Game Theory Models for Multi-Robot Patrolling of Infrastructures.
- Published in:
- International Journal of Advanced Robotic Systems, 2013, v. 10, n. 3, p. 1, doi. 10.5772/55535
- By:
- Publication type:
- Article
A Hybrid Vulnerability Analysis Tool Using a Risk Evaluation Technique.
- Published in:
- Wireless Personal Communications, 2019, v. 105, n. 2, p. 443, doi. 10.1007/s11277-018-5959-z
- By:
- Publication type:
- Article
Security in e-voting.
- Published in:
- IT: Information Technology, 2014, v. 56, n. 6, p. 300, doi. 10.1515/itit-2014-1062
- By:
- Publication type:
- Article
Usable Security - Results from a Field Study.
- Published in:
- I-com, 2016, v. 15, n. 2, p. 203, doi. 10.1515/icom-2016-0026
- By:
- Publication type:
- Article
Verifying OSEK/VDX automotive applications: A Spin‐based model checking approach.
- Published in:
- Software Testing: Verification & Reliability, 2018, v. 28, n. 3, p. 1, doi. 10.1002/stvr.1662
- By:
- Publication type:
- Article
An Automated Vulnerability Detection and Remediation Method for Software Security.
- Published in:
- Sustainability (2071-1050), 2018, v. 10, n. 5, p. 1652, doi. 10.3390/su10051652
- By:
- Publication type:
- Article
Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 3, p. 401, doi. 10.1109/TDSC.2012.18
- By:
- Publication type:
- Article
Enlargement of vulnerable web applications for testing.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 12, p. 6598, doi. 10.1007/s11227-017-1981-2
- By:
- Publication type:
- Article
Technology Transfer: A Software Security Marketplace Case Study.
- Published in:
- 2011
- By:
- Publication type:
- Case Study
Detection malicious Android application based on simple-Dalvik intermediate language.
- Published in:
- Neural Computing & Applications, 2019, v. 31, n. 1, p. 185, doi. 10.1007/s00521-018-3726-4
- By:
- Publication type:
- Article
DEVELOPING SECURE CLOUD APPLICATIONS.
- Published in:
- Scalable Computing: Practice & Experience, 2014, v. 15, n. 1, p. 49, doi. 10.12694/scpe.v15i1.965
- By:
- Publication type:
- Article
Security of the Citizen Oriented Informatics Applications Based on Orthogonality.
- Published in:
- Economy Informatics, 2014, v. 14, n. 1, p. 23
- By:
- Publication type:
- Article