UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 98
1.
  • Evaluating the effectivenes... Evaluating the effectiveness of a security flaws prevention tool
    Gershfeld, Itzhak; Sturm, Arnon Information and software technology, June 2024, Volume: 170
    Journal Article
    Peer reviewed

    Securing code is crucial for all software stakeholders. Nevertheless, state-of-the-art tools are imperfect and tend to miss critical errors, resulting in zero-day vulnerabilities. Thus, there is a ...
Full text
2.
Full text
3.
  • Security in microservice-ba... Security in microservice-based systems: A Multivocal literature review
    Pereira-Vale, Anelis; Fernandez, Eduardo B.; Monge, Raúl ... Computers & security, April 2021, 2021-04-00, 20210401, Volume: 103
    Journal Article
    Peer reviewed

    Microservices define an architectural style that conceives systems as a suite of modular, independent and scalable services. While application design is now simpler, designing secure applications is ...
Full text
4.
  • SSDTutor: A feedback-driven... SSDTutor: A feedback-driven intelligent tutoring system for secure software development
    Newar, Dip Kiran Pradhan; Zhao, Rui; Siy, Harvey ... Science of computer programming, April 2023, 2023-04-00, Volume: 227
    Journal Article
    Peer reviewed

    Application Programming Interfaces (APIs) in cryptography typically impose concealed usage constraints. The violations of these usage constraints can lead to software crashes or security ...
Full text
5.
Full text
6.
Full text

PDF
7.
  • Systematic Mapping Study on... Systematic Mapping Study on Security Approaches in Secure Software Engineering
    Khan, Rafiq Ahmad; Khan, Siffat Ullah; Khan, Habib Ullah ... IEEE access, 2021, Volume: 9
    Journal Article
    Peer reviewed
    Open access

    In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data ...
Full text

PDF
8.
  • Systematic Literature Revie... Systematic Literature Review on Security Risks and its Practices in Secure Software Development
    Khan, Rafiq Ahmad; Khan, Siffat Ullah; Khan, Habib Ullah ... IEEE access, 2022, Volume: 10
    Journal Article
    Peer reviewed
    Open access

    Security is one of the most critical aspects of software quality. Software security refers to the process of creating and developing software that assures the integrity, confidentiality, and ...
Full text

PDF
9.
  • Developer-oriented Web Security by Integrating Secure SDLC into IDEs
    Emin İslam Tatlı Sakarya university journal of computer and information sciences, 04/2018, Volume: 1, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Enterprises and organizations have difficulties to protect their web-based services against cyber-attacks. Due to increasing number of cyber-attacks, critical data including customer data, patient ...
Full text
10.
  • Evaluation of requirement e... Evaluation of requirement engineering best practices for secure software development in GSD: An ISM analysis
    Khan, Rafiq Ahmad; Akbar, Muhammad Azeem; Rafi, Saima ... Journal of software : evolution and process, 20/May , Volume: 36, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    Technological advancement makes the world a global village. Security is an evergreen and everlasting area, because of the continuous threat from Hackers and Crackers. The immense use of software ...
Full text
1 2 3 4 5
hits: 98

Load filters