Works matching DE "COMPUTER software security"
Results: 281
Design and Implementation of Fuzzing Framework Based on IoT Applications.
- Published in:
- Wireless Personal Communications, 2017, v. 93, n. 2, p. 365, doi. 10.1007/s11277-016-3322-9
- By:
- Publication type:
- Article
Software Vulnerability Detection Methodology Combined with Static and Dynamic Analysis.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 777, doi. 10.1007/s11277-015-3152-1
- By:
- Publication type:
- Article
Convergence Interaction for Communication.
- Published in:
- 2016
- By:
- Publication type:
- Editorial
درجة توفر متطلبات تطبيق الإدارة الإلكترونية في وزارة الأشغال العامة والإسكان من وجهة نظر العاملين.
- Published in:
- IUG Journal of Economics & Business, 2022, v. 30, n. 2, p. 96, doi. 10.33976/IUGJEB.30.2/2022/4
- By:
- Publication type:
- Article
Application of Resistive Random Access Memory in Hardware Security: A Review.
- Published in:
- Advanced Electronic Materials, 2021, v. 7, n. 12, p. 1, doi. 10.1002/aelm.202100536
- By:
- Publication type:
- Article
Vulnerability Scanning by CPE-CVE Matching.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 2, p. 1289
- By:
- Publication type:
- Article
A Comparative Study of Commit Representations for JIT Vulnerability Prediction.
- Published in:
- Computers (2073-431X), 2024, v. 13, n. 1, p. 22, doi. 10.3390/computers13010022
- By:
- Publication type:
- Article
An Empirical Study on Security Knowledge Sharing and Learning in Open Source Software Communities.
- Published in:
- Computers (2073-431X), 2018, v. 7, n. 4, p. 49, doi. 10.3390/computers7040049
- By:
- Publication type:
- Article
Hardware-Assisted Secure Communication in Embedded and Multi-Core Computing Systems.
- Published in:
- Computers (2073-431X), 2018, v. 7, n. 2, p. 31, doi. 10.3390/computers7020031
- By:
- Publication type:
- Article
Automatically Detect Software Security Vulnerabilities Based on Natural Language Processing Techniques and Machine Learning Algorithms.
- Published in:
- Journal of ICT Research & Applications, 2022, v. 16, n. 1, p. 70, doi. 10.5614/itbj.ict.res.appl.2022.16.1.5
- By:
- Publication type:
- Article
The CAN Bus in the Maritime Environment – Technical Overview and Cybersecurity Vulnerabilities.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2021, v. 15, n. 3, p. 531, doi. 10.12716/1001.15.03.05
- By:
- Publication type:
- Article
Towards a security‐optimized approach for the microservice‐oriented decomposition.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 10, p. 1, doi. 10.1002/smr.2670
- By:
- Publication type:
- Article
A catalog of metrics at source code level for vulnerability prediction: A systematic mapping study.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 7, p. 1, doi. 10.1002/smr.2639
- By:
- Publication type:
- Article
Evaluation of requirement engineering best practices for secure software development in GSD: An ISM analysis.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 5, p. 1, doi. 10.1002/smr.2594
- By:
- Publication type:
- Article
Maturity model for secure software testing.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 5, p. 1, doi. 10.1002/smr.2593
- By:
- Publication type:
- Article
Security risks of global software development life cycle: Industry practitioner's perspective.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 3, p. 1, doi. 10.1002/smr.2521
- By:
- Publication type:
- Article
Advanced security testing using a cyber‐attack forecasting model: A case study of financial institutions.
- Published in:
- Journal of Software: Evolution & Process, 2022, v. 34, n. 11, p. 1, doi. 10.1002/smr.2489
- By:
- Publication type:
- Article
Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning.
- Published in:
- Future Internet, 2025, v. 17, n. 1, p. 33, doi. 10.3390/fi17010033
- By:
- Publication type:
- Article
Explainable Security Requirements Classification Through Transformer Models.
- Published in:
- Future Internet, 2025, v. 17, n. 1, p. 15, doi. 10.3390/fi17010015
- By:
- Publication type:
- Article
A Secure Auditable Remote Registry Pattern for IoT Systems.
- Published in:
- Future Internet, 2024, v. 16, n. 11, p. 405, doi. 10.3390/fi16110405
- By:
- Publication type:
- Article
MACHINE LEARNING FOR SOFTWARE SECURITY TESTING.
- Published in:
- Annals of DAAAM & Proceedings, 2024, v. 35, p. 65, doi. 10.2507/35th.daaam.proceedings.009
- By:
- Publication type:
- Article
DEVELOPMENT AND IMPLEMENTATION OF A SECURE PRODUCTION NETWORK.
- Published in:
- Annals of DAAAM & Proceedings, 2020, v. 31, p. 736, doi. 10.2507/31st.daaam.proceedings.102
- By:
- Publication type:
- Article
Technical debt as an indicator of software security risk: a machine learning approach for software development enterprises.
- Published in:
- Enterprise Information Systems, 2022, v. 16, n. 5, p. 1, doi. 10.1080/17517575.2020.1824017
- By:
- Publication type:
- Article
Windows/CrowdStrike Outage: The Most Important Lesson.
- Published in:
- CounterPunch, 2024, p. 1
- By:
- Publication type:
- Article
Achieving a scalable and secure software defined network by identifiers separating and mapping.
- Published in:
- Computer Systems Science & Engineering, 2017, v. 32, n. 2, p. 159
- By:
- Publication type:
- Article
Threats and Countermeasures in Software Security with a Deep Dive into Click Baiting.
- Published in:
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2024, v. 27, n. 1, p. 61, doi. 10.21279/1454-864X-24-I1-008
- By:
- Publication type:
- Article
A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America.
- Published in:
- Informatics, 2023, v. 10, n. 3, p. 71, doi. 10.3390/informatics10030071
- By:
- Publication type:
- Article
The Impact of Competition Intensity on Software Security: An Empirical Analysis of Web Browser Patch Releases.
- Published in:
- Review of Network Economics, 2024, v. 23, n. 4, p. 161, doi. 10.1515/rne-2024-0045
- By:
- Publication type:
- Article
Cyberattack Nightmare Looms Due to Software Flaws.
- Published in:
- International Policy Digest, 2024, p. 2
- By:
- Publication type:
- Article
Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model.
- Published in:
- Journal of Engineering (2314-4912), 2024, v. 2024, p. 1, doi. 10.1155/2024/9962691
- By:
- Publication type:
- Article
CYBERSECURITY IN ALGERIA.
- Published in:
- Journal of Security & Sustainability Issues, 2023, v. 13, n. 1, p. 65, doi. 10.47459/jssi.2023.13.6
- By:
- Publication type:
- Article
Software Defined 5G and 6G Networks: a Survey.
- Published in:
- Mobile Networks & Applications, 2022, v. 27, n. 5, p. 1792, doi. 10.1007/s11036-019-01397-2
- By:
- Publication type:
- Article
Energy harvesting cognitive radio networks: security analysis for Nakagami-m fading.
- Published in:
- Wireless Networks (10220038), 2021, v. 27, n. 3, p. 1561, doi. 10.1007/s11276-019-02132-1
- By:
- Publication type:
- Article
Review of Techniques for Integrating Security in Software Development Lifecycle.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 1, p. 139, doi. 10.32604/cmc.2024.057587
- By:
- Publication type:
- Article
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis.
- Published in:
- Computers, Materials & Continua, 2024, v. 78, n. 3, p. 3867, doi. 10.32604/cmc.2024.046871
- By:
- Publication type:
- Article
Binary Program Vulnerability Mining Based on Neural Network.
- Published in:
- Computers, Materials & Continua, 2024, v. 78, n. 2, p. 1861, doi. 10.32604/cmc.2023.046595
- By:
- Publication type:
- Article
Fuzzing: Progress, Challenges, and Perspectives.
- Published in:
- Computers, Materials & Continua, 2024, v. 78, n. 1, p. 1, doi. 10.32604/cmc.2023.042361
- By:
- Publication type:
- Article
Dis-NDVW: Distributed Network Asset Detection and Vulnerability Warning Platform.
- Published in:
- Computers, Materials & Continua, 2023, v. 76, n. 1, p. 771, doi. 10.32604/cmc.2023.038268
- By:
- Publication type:
- Article
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.
- Published in:
- PLoS ONE, 2024, v. 19, n. 12, p. 1, doi. 10.1371/journal.pone.0316274
- By:
- Publication type:
- Article
One Target Among Many: Not Your Average Malware.
- Published in:
- IEEE Internet Computing, 2015, v. 19, n. 3, p. 72, doi. 10.1109/MIC.2015.64
- By:
- Publication type:
- Article
FREEDOM TO FILTER VERSUS USER CONTROL: LIMITING THE SCOPE OF § 230(C)(2) IMMUNITY.
- Published in:
- Journal of Law, Technology & Policy, 2014, v. 2014, n. 1, p. 105
- By:
- Publication type:
- Article
Research and Design of Docker Technology Based Authority Management System.
- Published in:
- Computational Intelligence & Neuroscience, 2022, p. 1, doi. 10.1155/2022/5325694
- By:
- Publication type:
- Article
Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis.
- Published in:
- Computational Intelligence & Neuroscience, 2022, p. 1, doi. 10.1155/2022/6775980
- By:
- Publication type:
- Article
Software Systems Security Vulnerabilities Management by Exploring the Capabilities of Language Models Using NLP.
- Published in:
- Computational Intelligence & Neuroscience, 2021, p. 1, doi. 10.1155/2021/8522839
- By:
- Publication type:
- Article
A DEFERENCE TO PROTOCOL: FASHIONING A THREE-DIMENSIONAL PUBLIC POLICY FRAMEWORK FOR THE INTERNET AGE.
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2013, v. 31, n. 3, p. 689
- By:
- Publication type:
- Article
A Call for Mandatory Input Validation and Fuzz Testing: A Call for Mandatory...: G. M. Køien, L. Øverlier.
- Published in:
- Wireless Personal Communications, 2025, v. 140, n. 1, p. 25, doi. 10.1007/s11277-023-10431-2
- By:
- Publication type:
- Article
基于图表示和MHGAT的代码漏洞静态检测方法.
- Published in:
- Systems Engineering & Electronics, 2023, p. 1535, doi. 10.12305/j.issn.1001-506X.2023.05.31
- By:
- Publication type:
- Article
Awareness and Application of Internet of Things in Universities Libraries in Kwara State, Nigeria.
- Published in:
- International Journal of Knowledge Content Development & Technology, 2024, v. 14, n. 4, p. 65, doi. 10.5865/IJKCT.2024.14.4.065
- By:
- Publication type:
- Article
RepFTI: Representation-Fused Function-Type Inference for Vehicular Secure Software Systems.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 11, p. 4502, doi. 10.3390/app14114502
- By:
- Publication type:
- Article
ICVTest: A Practical Black-Box Penetration Testing Framework for Evaluating Cybersecurity of Intelligent Connected Vehicles.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 1, p. 204, doi. 10.3390/app14010204
- By:
- Publication type:
- Article