Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 117
1.
  • Evaluating the effectivenes... Evaluating the effectiveness of a security flaws prevention tool
    Gershfeld, Itzhak; Sturm, Arnon Information and software technology, June 2024, Volume: 170
    Journal Article
    Peer reviewed

    Securing code is crucial for all software stakeholders. Nevertheless, state-of-the-art tools are imperfect and tend to miss critical errors, resulting in zero-day vulnerabilities. Thus, there is a ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
2.
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
3.
  • Security in microservice-ba... Security in microservice-based systems: A Multivocal literature review
    Pereira-Vale, Anelis; Fernandez, Eduardo B.; Monge, Raúl ... Computers & security, April 2021, 2021-04-00, 20210401, Volume: 103
    Journal Article
    Peer reviewed

    Microservices define an architectural style that conceives systems as a suite of modular, independent and scalable services. While application design is now simpler, designing secure applications is ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
4.
  • SSDTutor: A feedback-driven... SSDTutor: A feedback-driven intelligent tutoring system for secure software development
    Newar, Dip Kiran Pradhan; Zhao, Rui; Siy, Harvey ... Science of computer programming, April 2023, 2023-04-00, Volume: 227
    Journal Article
    Peer reviewed

    Application Programming Interfaces (APIs) in cryptography typically impose concealed usage constraints. The violations of these usage constraints can lead to software crashes or security ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
5.
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
6.
  • A Novel Framework for Information Security During the SDLC Implementation Stage: A Systematic Literature Review
    Mikael Octavinus Chan; Setiadi Yazid Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (Online), 02/2024, Volume: 8, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    This research delves into the critical aspects of information security during the implementation stage of the Software Development Life Cycle (SDLC). Using a systematic review of the literature, the ...
Full text
Available for: NUK, UL, UM, UPUK
7.
Full text
Available for: NUK, UL, UM

PDF
8.
  • Systematic Mapping Study on... Systematic Mapping Study on Security Approaches in Secure Software Engineering
    Khan, Rafiq Ahmad; Khan, Siffat Ullah; Khan, Habib Ullah ... IEEE access, 2021, Volume: 9
    Journal Article
    Peer reviewed
    Open access

    In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
9.
  • Systematic Literature Revie... Systematic Literature Review on Security Risks and its Practices in Secure Software Development
    Khan, Rafiq Ahmad; Khan, Siffat Ullah; Khan, Habib Ullah ... IEEE access, 2022, Volume: 10
    Journal Article
    Peer reviewed
    Open access

    Security is one of the most critical aspects of software quality. Software security refers to the process of creating and developing software that assures the integrity, confidentiality, and ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
10.
  • Developer-oriented Web Security by Integrating Secure SDLC into IDEs
    Emin İslam Tatlı Sakarya university journal of computer and information sciences, 04/2018, Volume: 1, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Enterprises and organizations have difficulties to protect their web-based services against cyber-attacks. Due to increasing number of cyber-attacks, critical data including customer data, patient ...
Full text
Available for: NUK, UL, UM, UPUK
1 2 3 4 5
hits: 117

Load filters