Works matching DE "SECURITY systems software"
Results: 34
C PROGRAMLAMA DİLİNDE KAYNAK KOD GÜVENLİĞİ: SECUREC.
- Published in:
- SDU Journal of Engineering Sciences & Design / Mühendislik Bilimleri ve Tasarım Dergisi, 2022, v. 10, n. 2, p. 561, doi. 10.21923/jesd.1031774
- By:
- Publication type:
- Article
ІДЕАЛІЗОВАНІ МОДЕЛІ РЕІНЖИНІРИНГУ ПРОГРАМНИХ СИСТЕМ
- Published in:
- Radio Electronics, Computer Science, Control, 2019, n. 1, p. 150, doi. 10.15588/1607-3274-2019-1-14
- By:
- Publication type:
- Article
Yazılım Kalitesi Faktörü Olarak Yazılım Güvenliğinin Öğrenci Bilgi Sisteminde RIPS Testi ile Değerlendirilmesi.
- Published in:
- Ataturk University Journal of Economics & Administrative Sciences, 2019, v. 33, n. 4, p. 1261
- By:
- Publication type:
- Article
煤炭安全智能开采地质保障系统软件开发与应用.
- Published in:
- Coal Science & Technology (0253-2336), 2022, v. 50, n. 7, p. 13, doi. 10.13199/j.cnki.cst.2022-0471
- By:
- Publication type:
- Article
Safety and security of cyber‐physical systems.
- Published in:
- Journal of Software: Evolution & Process, 2023, v. 35, n. 7, p. 1, doi. 10.1002/smr.2522
- By:
- Publication type:
- Article
Model‐driven engineering of safety and security software systems: A systematic mapping study and future research directions.
- Published in:
- Journal of Software: Evolution & Process, 2023, v. 35, n. 7, p. 1, doi. 10.1002/smr.2457
- By:
- Publication type:
- Article
CYBER SECURITY ANALYSIS SYSTEMS OF SOFTWARE AND TECHNICAL SUPPORT OF ENTERPRISE COMPUTERS AND SITES.
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2023, v. 13, n. 1/2, p. 75, doi. 10.15276/imms.v13.no1-2.75
- By:
- Publication type:
- Article
Security Analysis of Large Language Models on API Misuse Programming Repair.
- Published in:
- International Journal of Intelligent Systems, 2024, v. 2024, p. 1, doi. 10.1155/2024/7135765
- By:
- Publication type:
- Article
A Business-Oriented Methodology to Evaluate the Security of Software Architecture Quantitatively.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2024, v. 34, n. 2, p. 239, doi. 10.1142/S0218194023500511
- By:
- Publication type:
- Article
VeRA: Verifying RBAC and Authorization Constraints Models of Web Applications.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2021, v. 31, n. 5, p. 655, doi. 10.1142/S0218194021500182
- By:
- Publication type:
- Article
Study of Finger Vein Authentication Algorithms for Physical Access Control.
- Published in:
- Electronics & Electrical Engineering, 2012, n. 121, p. 101
- By:
- Publication type:
- Article
Agri-food safety optimized by blockchain technology: review.
- Published in:
- Revista Facultad Nacional de Agronomía Medellín, 2022, v. 75, n. 1, p. 9839, doi. 10.15446/rfnam.v75n1.95760
- By:
- Publication type:
- Article
'Canary' for water plants.
- Published in:
- Chemical Engineering, 2011, v. 118, n. 9, p. 13
- Publication type:
- Article
PKG-VUL: Security Vulnerability Evaluation and Patch Framework for Package-Based Systems.
- Published in:
- ETRI Journal, 2009, v. 31, n. 5, p. 554, doi. 10.4218/etrij.09.0108.0578
- By:
- Publication type:
- Article
Making security type systems less ad hoc.
- Published in:
- IT: Information Technology, 2014, v. 56, n. 6, p. 267, doi. 10.1515/itit-2014-1060
- By:
- Publication type:
- Article
A Brief Introduction to Usable Security.
- Published in:
- 2008
- By:
- Publication type:
- Case Study
Software Systems Security Vulnerabilities Management by Exploring the Capabilities of Language Models Using NLP.
- Published in:
- Computational Intelligence & Neuroscience, 2021, p. 1, doi. 10.1155/2021/8522839
- By:
- Publication type:
- Article
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs.
- Published in:
- International Journal on Software Tools for Technology Transfer, 2016, v. 18, n. 2, p. 187, doi. 10.1007/s10009-015-0385-y
- By:
- Publication type:
- Article
Deep Learning Based Cyber Event Detection from Open-Source Re-Emerging Social Data.
- Published in:
- Computers, Materials & Continua, 2023, v. 76, n. 2, p. 1423, doi. 10.32604/cmc.2023.035741
- By:
- Publication type:
- Article
Deep Learning Based Cyber Event Detection from Open-Source Re-Emerging Social Data.
- Published in:
- Computers, Materials & Continua, 2023, v. 76, n. 2, p. 1423, doi. 10.32604/cmc.2023.035741
- By:
- Publication type:
- Article
Reinforcement Learning for Generating Secure Configurations.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 19, p. 2392, doi. 10.3390/electronics10192392
- By:
- Publication type:
- Article
基于核函数的软件定义网络 DDoS 实时安全系统.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2020, v. 37, n. 3, p. 843, doi. 10.19734/j.issn.1001-3695.2018.09.0659
- By:
- Publication type:
- Article
RepFTI: Representation-Fused Function-Type Inference for Vehicular Secure Software Systems.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 11, p. 4502, doi. 10.3390/app14114502
- By:
- Publication type:
- Article
Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks.
- Published in:
- Sensors (14248220), 2017, v. 17, n. 10, p. 2191, doi. 10.3390/s17102191
- By:
- Publication type:
- Article
Preface to the Special Issue on System and Cyberspace Security.
- Published in:
- International Journal of Software & Informatics, 2024, v. 14, n. 3, p. 221, doi. 10.21655/ijsi.1673-7288.00330
- By:
- Publication type:
- Article
Preface to the Special Issue on Formal Methods and Applications.
- Published in:
- International Journal of Software & Informatics, 2024, v. 14, n. 4, p. 349, doi. 10.21655/ijsi.1673-7288.00336
- By:
- Publication type:
- Article
GOOD SOFTWARE PERFORMS ATASK, GREAT SOFTWARE PROVIDES A SOLUTION.
- Published in:
- Elevator World, 2021, v. 69, n. 7, p. 64
- Publication type:
- Article
Crowdstrike and Kernel-Level Access.
- Published in:
- ITNOW, 2024, v. 66, n. 4, p. 58, doi. 10.1093/itnow/bwae135
- By:
- Publication type:
- Article
Assessing human vulnerability in industrial chemical accidents: a qualitative and quantitative methodological approach.
- Published in:
- Environmental Monitoring & Assessment, 2019, v. 191, n. 8, p. N.PAG, doi. 10.1007/s10661-019-7662-2
- By:
- Publication type:
- Article
Digital Trust and Adopting Generative AI.
- Published in:
- ISACA Journal, 2023, n. 5, p. 13
- By:
- Publication type:
- Article
API Sprawl and Emergence.
- Published in:
- ISACA Journal, 2023, n. 2, p. 8
- By:
- Publication type:
- Article
The impact of feature types, classifiers, and data balancing techniques on software vulnerability prediction models.
- Published in:
- Journal of Software: Evolution & Process, 2019, v. 31, n. 9, p. N.PAG, doi. 10.1002/smr.2164
- By:
- Publication type:
- Article
Privacy issues of android application permissions: A literature review.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2020, v. 31, n. 12, p. 1, doi. 10.1002/ett.3773
- By:
- Publication type:
- Article
EVALUATING TOOLS FOR EXECUTION AND MANAGEMENT OF AUTHORIZATION BUSINESS RULES.
- Published in:
- Revista Eletrônica de Sistemas de Informação, 2010, v. 9, n. 2, p. 1, doi. 10.5329/RESI.2010.0902009
- By:
- Publication type:
- Article