Works matching DE "APPLICATION software security measures"
1
- Neural Computing & Applications, 2019, v. 31, n. 1, p. 185, doi. 10.1007/s00521-018-3726-4
- Li, Qi;
- Sun, Bowen;
- Chen, Meiqi;
- Dong, Hang
- Article
2
- IT Professional, 2012, v. 14, n. 5, p. 28, doi. 10.1109/MITP.2012.72
- Jain, Anurag Kumar;
- Shanbhag, Devendra
- Article
3
- IEEE Transactions on Software Engineering, 2012, v. 38, n. 1, p. 101, doi. 10.1109/TSE.2011.6
- Toledo, Rodolfo;
- Nunez, Angel;
- Tanter, Eric;
- Noye, Jacques
- Article
4
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 3, p. 401, doi. 10.1109/TDSC.2012.18
- Fu, Zhang;
- Papatriantafilou, Marina;
- Tsigas, Philippas
- Article
5
- IT: Information Technology, 2014, v. 56, n. 6, p. 300, doi. 10.1515/itit-2014-1062
- Küsters, Ralf;
- Truderung, Tomasz
- Article
6
- I-com, 2016, v. 15, n. 2, p. 203, doi. 10.1515/icom-2016-0026
- Iacono, Luigi Lo;
- Nguyen, Hoai Viet;
- Schmitt, Hartmut
- Article
7
- Software Testing: Verification & Reliability, 2018, v. 28, n. 3, p. 1, doi. 10.1002/stvr.1662
- Zhang, Haitao;
- Li, Guoqiang;
- Cheng, Zhuo;
- Xue, Jinyun
- Article
8
- Software Quality Professional, 2015, v. 17, n. 2, p. 30
- SHUBHAMANGALA, B. R.;
- SAHA, SNEHANSHU;
- JAYALAKSHMI, M.
- Article
9
- Journal of Supercomputing, 2018, v. 74, n. 12, p. 6598, doi. 10.1007/s11227-017-1981-2
- Román Muñoz, Fernando;
- Sabido Cortes, Iván Israel;
- García Villalba, Luis Javier
- Article
10
- Wireless Personal Communications, 2019, v. 105, n. 2, p. 443, doi. 10.1007/s11277-018-5959-z
- Park, Jaepyo;
- Choo, Yeunsoo;
- Lee, Jonghee
- Article
11
- IEEE Transactions on Software Engineering, 2008, v. 34, n. 1, p. 50, doi. 10.1109/TSE.2007.70742
- Desmet, Lieven;
- Verbaeten, Pierre;
- Joosen, Wouter;
- Piessens, Frank
- Article
12
- Scalable Computing: Practice & Experience, 2014, v. 15, n. 1, p. 49, doi. 10.12694/scpe.v15i1.965
- RAK, MASSIMILIANO;
- FICCO, MASSIMO;
- BATTISTA, ERMANNO;
- CASOLA, VALENTINA;
- MAZZOCCA, NICOLA
- Article
13
- Sensors (14248220), 2017, v. 17, n. 10, p. 2348, doi. 10.3390/s17102348
- Shi-Cho Cha;
- Kuo-Hui Yeh;
- Jyun-Fu Chen
- Article
14
- International Journal of Neutrosophic Science (IJNS), 2023, v. 21, n. 4, p. 106, doi. 10.54216/IJNS.210411
- Mohamed, Ehab R.;
- Mansour, Heba M.;
- El-Komy, Osama M.
- Article
15
- Economy Informatics, 2014, v. 14, n. 1, p. 23
- IVAN, Ion;
- MILODIN, Daniel;
- ZAMFIROIU, Alin
- Article
16
- Sustainability (2071-1050), 2018, v. 10, n. 5, p. 1652, doi. 10.3390/su10051652
- Jurn, Jeesoo;
- Kim, Taeeun;
- Kim, Hwankuk
- Article
17
- International Journal of Advanced Robotic Systems, 2013, v. 10, n. 3, p. 1, doi. 10.5772/55535
- Hernández, Erik;
- Cerro, Jaime del;
- Barrientos, Antonio
- Article
18
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2016, v. 19, n. 2, p. 468, doi. 10.21279/1454-864X-16-I2-070
- MIHAILESCU, Marius Iulian;
- BETERINGHE, Adrian;
- OPRIS, Violeta
- Article
19
- International Journal of Information Security, 2010, v. 9, n. 5, p. 353, doi. 10.1007/s10207-010-0114-1
- Chen, Haiyong;
- Chen, Hailiang
- Article
20
- Journal of Applied Quantitative Methods, 2010, v. 5, n. 4, p. 527
- POCATILU, Paul;
- CIUREA, Cristian;
- DOINEA, Mihai
- Article
21
- Software: Practice & Experience, 2017, v. 47, n. 1, p. 143, doi. 10.1002/spe.2401
- Kupsch, James A.;
- Heymann, Elisa;
- Miller, Barton;
- Basupalli, Vamshi
- Article
23
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/8690853
- Zhang, Meiyu;
- Zhang, Qianying;
- Zhao, Shijun;
- Shi, Zhiping;
- Guan, Yong
- Article
24
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/8093578
- Ma, Haiying;
- Wang, Zhanjun;
- Guan, Zhijin
- Article