NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 119
1.
  • Evaluating the effectivenes... Evaluating the effectiveness of a security flaws prevention tool
    Gershfeld, Itzhak; Sturm, Arnon Information and software technology, June 2024, 2024-06-00, Volume: 170
    Journal Article
    Peer reviewed

    Securing code is crucial for all software stakeholders. Nevertheless, state-of-the-art tools are imperfect and tend to miss critical errors, resulting in zero-day vulnerabilities. Thus, there is a ...
Full text
2.
Full text
3.
  • Security in microservice-ba... Security in microservice-based systems: A Multivocal literature review
    Pereira-Vale, Anelis; Fernandez, Eduardo B.; Monge, Raúl ... Computers & security, April 2021, 2021-04-00, 20210401, Volume: 103
    Journal Article
    Peer reviewed

    Microservices define an architectural style that conceives systems as a suite of modular, independent and scalable services. While application design is now simpler, designing secure applications is ...
Full text
4.
  • SSDTutor: A feedback-driven... SSDTutor: A feedback-driven intelligent tutoring system for secure software development
    Newar, Dip Kiran Pradhan; Zhao, Rui; Siy, Harvey ... Science of computer programming, April 2023, 2023-04-00, Volume: 227
    Journal Article
    Peer reviewed

    Application Programming Interfaces (APIs) in cryptography typically impose concealed usage constraints. The violations of these usage constraints can lead to software crashes or security ...
Full text
5.
  • A Novel Framework for Infor... A Novel Framework for Information Security During the SDLC Implementation Stage: A Systematic Literature Review
    Mikael Octavinus Chan; Setiadi Yazid Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (Online), 02/2024, Volume: 8, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    This research delves into the critical aspects of information security during the implementation stage of the Software Development Life Cycle (SDLC). By employing a systematic literature review, the ...
Full text
6.
Full text
7.
Full text

PDF
8.
  • Systematic Mapping Study on... Systematic Mapping Study on Security Approaches in Secure Software Engineering
    Khan, Rafiq Ahmad; Khan, Siffat Ullah; Khan, Habib Ullah ... IEEE access, 2021, Volume: 9
    Journal Article
    Peer reviewed
    Open access

    In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data ...
Full text

PDF
9.
  • Developer-oriented Web Security by Integrating Secure SDLC into IDEs
    Emin İslam Tatlı Sakarya university journal of computer and information sciences, 04/2018, Volume: 1, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Enterprises and organizations have difficulties to protect their web-based services against cyber-attacks. Due to increasing number of cyber-attacks, critical data including customer data, patient ...
Full text
10.
  • The Application of a New Se... The Application of a New Secure Software Development Life Cycle (S-SDLC) with Agile Methodologies
    de Vicente Mohino, Juan; Bermejo Higuera, Javier; Bermejo Higuera, Juan Ramón ... Electronics (Basel), 2019, Volume: 8, Issue: 11
    Journal Article
    Peer reviewed
    Open access

    The software development environment is focused on reaching functional products in the shortest period by making use of the least amount of resources possible. In this scenario, crucial elements such ...
Full text

PDF
1 2 3 4 5
hits: 119

Load filters