Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

3 4 5 6 7
hits: 122
41.
  • An Anatomy of Security Conversations in Stack Overflow
    Lopez, Tamara; Tun, Thein; Bandara, Arosha ... 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS), 05/2019
    Conference Proceeding
    Open access

    As software-intensive digital systems become an integral part of modern life, ensuring that these systems are developed to satisfy security and privacy requirements is an increasingly important ...
Full text
Available for: IJS, NUK, UL, UM

PDF
42.
  • Programmer Cognition Failures as the Root Cause of Software Vulnerabilities: A Preliminary Review
    Patel, Darsh; Patel, Hetkumar; Sultana, Kazi Zakia ... 2023 Intermountain Engineering, Technology and Computing (IETC), 2023-May-12
    Conference Proceeding

    The causal analysis of software vulnerabilities can be an effective way for building and evolving a dependable and reliable software system. Vulnerable source code can be leveraged by the attackers ...
Full text
Available for: IJS, NUK, UL, UM
43.
  • Developers Are Neither Enemies Nor Users: They Are Collaborators
    Chowdhury, Partha Das; Hallett, Joseph; Patnaik, Nikhil ... 2021 IEEE Secure Development Conference (SecDev), 2021-Oct.
    Conference Proceeding
    Open access

    Developers struggle to program securely. Prior works have reviewed the methods used to run user-studies with developers, systematized the ancestry of security API usability recommendations, and ...
Full text
Available for: IJS, NUK, UL, UM

PDF
44.
  • Issues in the Implementation of Secure Software Development Processes
    Markov, Alexey S.; Varenitca, Vitaliy V.; Arustamyan, Sas S. 2023 Seminar on Information Systems Theory and Practice (ISTP), 2023-Nov.-30
    Conference Proceeding

    This paper presents the results obtained studying the prospective market of software security management systems in Russia that meet the requirements of national standards for secure software ...
Full text
Available for: IJS, NUK, UL, UM
45.
  • Meeting Industry Needs for Secure Software Development
    Mead, Nancy R.; Seshagiri, Girish; Howar, Julie 2016 IEEE 29th International Conference on Software Engineering Education and Training (CSEET), 04/2016
    Conference Proceeding, Journal Article

    In this paper, we describe a partnership between the Central Illinois Center of Excellence for Secure Software (CICESS) and Illinois Central College (ICC) that resulted in the creation of a two-year ...
Full text
Available for: IJS, NUK, UL, UM
46.
  • Secure Mobile Application for Uniform Resource Locator (URL) Phising Detection based on Deep Learning
    Tampati, Ihsan Fadli; Buana, I Komang Setia; Setiawan, Hermawan 2023 1st International Conference on Advanced Engineering and Technologies (ICONNIC), 2023-Oct.-14
    Conference Proceeding

    As time progresses, there is growth in the population of internet users, resulting in a rise in digital threats. Among these dangers, the prominence of phishing attacks has become a significant cause ...
Full text
Available for: IJS, NUK, UL, UM
47.
  • Exploring Security Procedur... Exploring Security Procedures in Secure Software Engineering: A Systematic Mapping Study
    Khan, Rafiq Ahmad; Khan, Siffat Ullah; Ilyas, Muhammad The International Conference on Evaluation and Assessment in Software Engineering 2022, 06/2022
    Conference Proceeding

    Various new technologies have developed as software security solutions have become more critical. One of the essential parts of software quality is the product's security. Though providing examples ...
Full text
Available for: NUK, UL
48.
  • Pattern-Based Context Estab... Pattern-Based Context Establishment for Service-Oriented Architectures
    Beckers, Kristian; Faßbender, Stephan; Heisel, Maritta ... Software Service and Application Engineering
    Book Chapter
    Peer reviewed

    A context description of a software system and its environment is essential for any given software engineering process. Requirements define statements about the environment (according to Jackson’s ...
Full text
49.
  • How Can Secure Software be ... How Can Secure Software be Trusted?
    Futcher, Lynn; Von Solms, Rossouw South African computer journal = Suid-Afrikaanse rekenaartydskrif, 11/2011, Volume: 47, Issue: 47
    Journal Article
    Peer reviewed
    Open access

    The security of software applications is a major concern, especially for information owners, software developers and users. Increasingly, these stakeholders need to be confident that the software ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
50.
  • Security Assessment of Low Earth Orbit (LEO) with Software-Defined Networking (SDN) Structure
    Chen, Shiang-Jiun; Wang, Tzu-Yun; Fang, Chin-Shen ... 2023 IEEE 6th International Conference on Knowledge Innovation and Invention (ICKII), 2023-Aug.-11
    Conference Proceeding

    The Software-defined networking (SDN) is integrated into Low Earth Orbit (LEO) satellite for flexible and agile operation. This cutting-edge convergence has security risks that require detailed ...
Full text
Available for: IJS, NUK, UL, UM
3 4 5 6 7
hits: 122

Load filters