Works matching DE "COMPUTER software security"
Results: 280
Handling index-out-of-bounds in safety-critical embedded C code using model-based development.
- Published in:
- Software & Systems Modeling, 2019, v. 18, n. 3, p. 1795, doi. 10.1007/s10270-018-0697-y
- By:
- Publication type:
- Article
Holistic security requirements analysis for socio-technical systems.
- Published in:
- Software & Systems Modeling, 2018, v. 17, n. 4, p. 1253, doi. 10.1007/s10270-016-0560-y
- By:
- Publication type:
- Article
An approach to clone detection in sequence diagrams and its application to security analysis.
- Published in:
- Software & Systems Modeling, 2018, v. 17, n. 4, p. 1287, doi. 10.1007/s10270-016-0557-6
- By:
- Publication type:
- Article
Survey on identification and prediction of security threats using various deep learning models on software testing.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 27, p. 69863, doi. 10.1007/s11042-024-18323-8
- By:
- Publication type:
- Article
Current Injection and Voltage Insertion Attacks Against the VMG-KLJN Secure Key Exchanger.
- Published in:
- Fluctuation & Noise Letters, 2023, v. 22, n. 1, p. 1, doi. 10.1142/S0219477523500098
- By:
- Publication type:
- Article
Comments on the "Generalized" KJLN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security.
- Published in:
- Fluctuation & Noise Letters, 2021, v. 20, n. 1, p. N.PAG, doi. 10.1142/S0219477521300020
- By:
- Publication type:
- Article
C PROGRAMLAMA DİLİNDE KAYNAK KOD GÜVENLİĞİ: SECUREC.
- Published in:
- SDU Journal of Engineering Sciences & Design / Mühendislik Bilimleri ve Tasarım Dergisi, 2022, v. 10, n. 2, p. 561, doi. 10.21923/jesd.1031774
- By:
- Publication type:
- Article
Software security management in critical infrastructures: a systematic literature review.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2022, v. 30, n. 4, p. 1142, doi. 10.55730/1300-0632.3841
- By:
- Publication type:
- Article
Security Universals.
- Published in:
- ISSA Journal, 2022, v. 20, n. 3, p. 6
- By:
- Publication type:
- Article
Preparing the Next Generation Security Professional.
- Published in:
- ISSA Journal, 2021, v. 19, n. 3, p. 12
- By:
- Publication type:
- Article
Association News.
- Published in:
- ISSA Journal, 2018, v. 16, n. 6, p. 10
- Publication type:
- Article
A Novel Seed Generation Approach for Vulnerability Mining Based on Generative Adversarial Networks and Attention Mechanisms.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 5, p. 745, doi. 10.3390/math12050745
- By:
- Publication type:
- Article
The Impact of Competition Intensity on Software Security: An Empirical Analysis of Web Browser Patch Releases.
- Published in:
- Review of Network Economics, 2024, v. 23, n. 4, p. 161, doi. 10.1515/rne-2024-0045
- By:
- Publication type:
- Article
Automatically Detect Software Security Vulnerabilities Based on Natural Language Processing Techniques and Machine Learning Algorithms.
- Published in:
- Journal of ICT Research & Applications, 2022, v. 16, n. 1, p. 70, doi. 10.5614/itbj.ict.res.appl.2022.16.1.5
- By:
- Publication type:
- Article
The CAN Bus in the Maritime Environment – Technical Overview and Cybersecurity Vulnerabilities.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2021, v. 15, n. 3, p. 531, doi. 10.12716/1001.15.03.05
- By:
- Publication type:
- Article
Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning.
- Published in:
- Future Internet, 2025, v. 17, n. 1, p. 33, doi. 10.3390/fi17010033
- By:
- Publication type:
- Article
Explainable Security Requirements Classification Through Transformer Models.
- Published in:
- Future Internet, 2025, v. 17, n. 1, p. 15, doi. 10.3390/fi17010015
- By:
- Publication type:
- Article
A Secure Auditable Remote Registry Pattern for IoT Systems.
- Published in:
- Future Internet, 2024, v. 16, n. 11, p. 405, doi. 10.3390/fi16110405
- By:
- Publication type:
- Article
Trusting Testcases Using Blockchain-Based Repository Approach.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 11, p. 2024, doi. 10.3390/sym13112024
- By:
- Publication type:
- Article
Cloud Computing Security Modeling and Analysis based on a Self-Cleansing Intrusion Tolerance Technique.
- Published in:
- Journal of Information Assurance & Security, 2016, v. 11, n. 5, p. 273
- By:
- Publication type:
- Article
An Empirical Validation of Object Oriented Design Security Quantification Model.
- Published in:
- Journal of Information Assurance & Security, 2014, v. 9, n. 1, p. 9
- By:
- Publication type:
- Article
Agile Development of Secure Software for Small and Medium-Sized Enterprises.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 1, p. 801, doi. 10.3390/su15010801
- By:
- Publication type:
- Article
Bridge Fire Vulnerability Hierarchy Assessment Based on the Weighted Topsis Method.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 21, p. 14174, doi. 10.3390/su142114174
- By:
- Publication type:
- Article
An Exploratory Study on Sustaining Cyber Security Protection through SETA Implementation.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 14, p. N.PAG, doi. 10.3390/su14148319
- By:
- Publication type:
- Article
Novel Secure Code Encryption Techniques Using Crypto Based Indexed Table for Highly Secured Software.
- Published in:
- International Review on Computers & Software, 2013, v. 8, n. 8, p. 1980
- By:
- Publication type:
- Article
Metodología y gobierno de la gestión de riesgos de tecnologías de la información.
- Published in:
- Revista de Ingeniería, 2010, n. 31, p. 109, doi. 10.16924/riua.v0i31.217
- By:
- Publication type:
- Article
INSECURE SOFTWARE IS EATING THE WORLD: PROMOTING CYBERSECURITY IN AN AGE OF UBIQUITOUS SOFTWARE-EMBEDDED SYSTEMS.
- Published in:
- Stanford Technology Law Review, 2017, v. 19, n. 3, p. 533
- By:
- Publication type:
- Article
Still the fire-proof house? An analysis of Canada's cyber security strategy.
- Published in:
- International Journal, 2011, v. 67, n. 1, p. 155
- By:
- Publication type:
- Article
PerkinElmer Beefs Up LIMS Security.
- Published in:
- 2003
- Publication type:
- Product Review
Requirements for tools for comprehending highly specialized assembly language code and how to elicit these requirements.
- Published in:
- Requirements Engineering, 2016, v. 21, n. 1, p. 131, doi. 10.1007/s00766-014-0214-y
- By:
- Publication type:
- Article
Using security robustness analysis for early-stage validation of functional security requirements.
- Published in:
- Requirements Engineering, 2016, v. 21, n. 1, p. 1, doi. 10.1007/s00766-014-0208-9
- By:
- Publication type:
- Article
A descriptive study of Microsoft's threat modeling technique.
- Published in:
- Requirements Engineering, 2015, v. 20, n. 2, p. 163, doi. 10.1007/s00766-013-0195-2
- By:
- Publication type:
- Article
Cybersecurity: How safe are your data?
- Published in:
- Nature, 2010, v. 464, n. 7293, p. 1260, doi. 10.1038/4641260a
- By:
- Publication type:
- Article
Licencovanie softvéru.
- Published in:
- Intellectual Property / Dusevne Vlastnictvo, 2021, v. 25, n. 3/4, p. 6
- By:
- Publication type:
- Article
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00160-1
- By:
- Publication type:
- Article
基于图表示和MHGAT的代码漏洞静态检测方法.
- Published in:
- Systems Engineering & Electronics, 2023, p. 1535, doi. 10.12305/j.issn.1001-506X.2023.05.31
- By:
- Publication type:
- Article
Hacker Behavior, Network Effects, and the Security Software Market.
- Published in:
- Journal of Management Information Systems, 2012, v. 29, n. 2, p. 77, doi. 10.2753/MIS0742-1222290204
- By:
- Publication type:
- Article
Security Requirements Engineering: A Framework for Representation and Analysis.
- Published in:
- IEEE Transactions on Software Engineering, 2008, v. 34, n. 1, p. 133, doi. 10.1109/TSE.2007.70754
- By:
- Publication type:
- Article
Towards a security‐optimized approach for the microservice‐oriented decomposition.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 10, p. 1, doi. 10.1002/smr.2670
- By:
- Publication type:
- Article
A catalog of metrics at source code level for vulnerability prediction: A systematic mapping study.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 7, p. 1, doi. 10.1002/smr.2639
- By:
- Publication type:
- Article
Evaluation of requirement engineering best practices for secure software development in GSD: An ISM analysis.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 5, p. 1, doi. 10.1002/smr.2594
- By:
- Publication type:
- Article
Maturity model for secure software testing.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 5, p. 1, doi. 10.1002/smr.2593
- By:
- Publication type:
- Article
Security risks of global software development life cycle: Industry practitioner's perspective.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 3, p. 1, doi. 10.1002/smr.2521
- By:
- Publication type:
- Article
Advanced security testing using a cyber‐attack forecasting model: A case study of financial institutions.
- Published in:
- Journal of Software: Evolution & Process, 2022, v. 34, n. 11, p. 1, doi. 10.1002/smr.2489
- By:
- Publication type:
- Article
Determinants of Software-as a-Service Adoption by Small and Medium Enterprises in Tanzania.
- Published in:
- African Journal of Information Systems, 2022, v. 14, n. 1, p. 23
- By:
- Publication type:
- Article
The possibilities of ensuring the security of the software product in the conditions of unauthorized access.
- Published in:
- Economic Annals-XXI / Ekonomìčnij Časopis-XXI, 2021, v. 189, n. 5/6, p. 90, doi. 10.21003/ea.V189-09
- By:
- Publication type:
- Article
Rethinking Software Component Security: Software Component Level Integrity and Cross Verification.
- Published in:
- Computer Journal, 2016, v. 59, n. 11, p. 1735, doi. 10.1093/comjnl/bxw047
- By:
- Publication type:
- Article
Software Defined 5G and 6G Networks: a Survey.
- Published in:
- Mobile Networks & Applications, 2022, v. 27, n. 5, p. 1792, doi. 10.1007/s11036-019-01397-2
- By:
- Publication type:
- Article
Quantitative Evaluation of Software Security: AnApproach Based on UML/SecAM and Evidence Theory.
- Published in:
- ISeCure, 2016, v. 8, n. 2, p. 143
- By:
- Publication type:
- Article
A novel Security Mechanism for Software Defined Network Based on Blockchain.
- Published in:
- Computer Science & Information Systems, 2022, v. 19, n. 2, p. 523, doi. 10.2298/CSIS210222001G
- By:
- Publication type:
- Article