UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

3 4 5 6 7
hits: 104
41.
  • Issues in the Implementation of Secure Software Development Processes
    Markov, Alexey S.; Varenitca, Vitaliy V.; Arustamyan, Sas S. 2023 Seminar on Information Systems Theory and Practice (ISTP), 2023-Nov.-30
    Conference Proceeding

    This paper presents the results obtained studying the prospective market of software security management systems in Russia that meet the requirements of national standards for secure software ...
Full text
42.
  • Meeting Industry Needs for Secure Software Development
    Mead, Nancy R.; Seshagiri, Girish; Howar, Julie 2016 IEEE 29th International Conference on Software Engineering Education and Training (CSEET), 04/2016
    Conference Proceeding, Journal Article

    In this paper, we describe a partnership between the Central Illinois Center of Excellence for Secure Software (CICESS) and Illinois Central College (ICC) that resulted in the creation of a two-year ...
Full text
43.
  • Secure Mobile Application for Uniform Resource Locator (URL) Phising Detection based on Deep Learning
    Tampati, Ihsan Fadli; Buana, I Komang Setia; Setiawan, Hermawan 2023 1st International Conference on Advanced Engineering and Technologies (ICONNIC), 2023-Oct.-14
    Conference Proceeding

    As time progresses, there is growth in the population of internet users, resulting in a rise in digital threats. Among these dangers, the prominence of phishing attacks has become a significant cause ...
Full text
44.
Full text

PDF
45.
  • Security Assessment of Low Earth Orbit (LEO) with Software-Defined Networking (SDN) Structure
    Chen, Shiang-Jiun; Wang, Tzu-Yun; Fang, Chin-Shen ... 2023 IEEE 6th International Conference on Knowledge Innovation and Invention (ICKII), 2023-Aug.-11
    Conference Proceeding

    The Software-defined networking (SDN) is integrated into Low Earth Orbit (LEO) satellite for flexible and agile operation. This cutting-edge convergence has security risks that require detailed ...
Full text
46.
  • Secure Software Developing ... Secure Software Developing Recommendations
    Grechko, Viktoria; Babenko, Tetiana; Myrutenko, Larysa 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), 2019-Oct.
    Conference Proceeding

    Adverse effects on information in the functioning computer systems of various purpose is carried out in order to violate their confidentiality, integrity and accessibility. These threats arise from ...
Full text
47.
Full text
48.
  • Towards Cooperative Games for Developing Secure Software in Agile SDLC
    Vaidhyanathan, Mithun; Si, Weisheng; Javadi, Bahman ... 2022 IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2022-Dec.-7
    Conference Proceeding

    This work applies Game Theory to developing secure software. With the perspective of Game Theory, one can see secure software development as a game between software developers and software security ...
Full text
49.
  • Security Requirement Modeli... Security Requirement Modeling Support System Using Software Security Knowledge Base
    Hazeyama, Atsuo; Tanaka, Shun'ichi; Tanaka, Takafumi ... 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), 2018-July, Volume: 2
    Conference Proceeding

    With the growing number of services on the Internet, the need for secure software development has increased. It is required for secure software development to consider security in the whole ...
Full text
50.
  • AI-Assisted Security: A Step towards Reimagining Software Development for a Safer Future
    Shi, Yong; Sakib, Nazmus; Shahriar, Hossain ... 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC), 2023-June
    Conference Proceeding

    The security threats to software are increasing dramatically, and software security is non-negotiable in this age of information technology. AI-based tools can make code suggestions, improve ...
Full text
3 4 5 6 7
hits: 104

Load filters