Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

2 3 4 5 6
hits: 122
31.
Full text
32.
  • ABET Cybersecurity Continual Course Improvements for Secure Software Development
    Schmeelk, Suzanna E.; Dragos, Denise M.; DeBello, Joan E. 2021 IEEE Frontiers in Education Conference (FIE), 2021-Oct.-13
    Conference Proceeding

    This is an innovative practice full paper. The need to develop software securely cannot be over-emphasized. The changing legal and regulatory international and local landscape for software ...
Full text
Available for: IJS, NUK, UL, UM
33.
  • State of the systems security State of the systems security
    Bodden, Eric 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion), 05/2018
    Conference Proceeding

    Software-intensive systems are increasingly pervading our everyday lives. As they get more and more connected, this opens them up to far-reaching cyber attacks. Moreover, a recent study by the U.S. ...
Full text
Available for: IJS, NUK, UL, UM
34.
  • Applying Software Assurance... Applying Software Assurance and Cybersecurity NICE Job Tasks through Secure Software Engineering Labs
    Dawson, Maurice; Taveras, Pedro; Taylor, Danielle Procedia computer science, 2019, 2019-00-00, Volume: 164
    Journal Article
    Peer reviewed
    Open access

    To meet growing demands in the United States market for cybersecurity professionals, the National Security Agency and Department of Homeland Security have jointly established the National Center for ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
35.
  • METHODOLOGICAL FRAMEWORK FO... METHODOLOGICAL FRAMEWORK FOR ANALYSIS AND SYNTHESIS OF A SET OF SECURE SOFTWARE DEVELOPMENT CONTROLS
    Barabanov, Alexander Vladimirovich; Markov, Alexey Sergeevich; Tsirlov, Valentin Leonidovich Journal of Theoretical and Applied Information Technology, 06/2016, Volume: 88, Issue: 1
    Journal Article

    This article discusses the issues of standardizing commercial production of secure software products. It studies administrative and technical controls for minimizing the number of vulnerabilities ...
Full text
Available for: NUK, UL, UM, UPUK
36.
  • The effects of required sec... The effects of required security on software development effort
    Venson, Elaine 2020 IEEE/ACM 42nd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), 06/2020
    Conference Proceeding

    Problem: developers are increasingly adopting security practices in software projects in response to cyber threats. Despite the additional effort required to perform those practices, current cost ...
Full text
Available for: IJS, NUK, UL, UM
37.
Full text

PDF
38.
  • You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users
    Acar, Yasemin; Fahl, Sascha; Mazurek, Michelle L. 2016 IEEE Cybersecurity Development (SecDev), 2016-Nov.
    Conference Proceeding

    While researchers have developed many tools, techniques, and protocols for improving software security, exploits and breaches are only becoming more frequent. Some of this gap between theoretical ...
Full text
Available for: IJS, NUK, UL, UM
39.
  • Evaluation of the Pattern-b... Evaluation of the Pattern-based method for Secure Development (PbSD): A controlled experiment
    Abramov, Jenny; Sturm, Arnon; Shoval, Peretz Information and software technology, September 2012, 2012-9-00, 20120901, Volume: 54, Issue: 9
    Journal Article
    Peer reviewed

    Security in general, and database protection from unauthorized access in particular, are crucial for organizations. Although it has been long accepted that the important system requirements should be ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
40.
  • Continuous Fuzzing: A Study of the Effectiveness and Scalability of Fuzzing in CI/CD Pipelines
    Klooster, Thijs; Turkmen, Fatih; Broenink, Gerben ... 2023 IEEE/ACM International Workshop on Search-Based and Fuzz Testing (SBFT)
    Conference Proceeding

    While fuzzing can be very costly, it has proven to be a fundamental technique in uncovering bugs (often security related) in many applications. A recent study on bug reports from OSS-Fuzz observed ...
Full text
Available for: IJS, NUK, UL, UM
2 3 4 5 6
hits: 122

Load filters