Results 251 to 260 of about 1,328,609 (285)
Some of the next articles are maybe not open access.
Proceedings of the companion publication of the 2014 ACM SIGPLAN conference on Systems, Programming, and Applications: Software for Humanity - SPLASH '14, 2014
Where do security technologies come from? Academics propose research and government (sometimes) funds it. Startups move technologies across the "research valley of death" to early adopters. Global corporations make technology widely available by acquiring startups. At every step there are gaps and pitfalls. Adoption is the acid test of innovation. Idea-
openaire +1 more source
Where do security technologies come from? Academics propose research and government (sometimes) funds it. Startups move technologies across the "research valley of death" to early adopters. Global corporations make technology widely available by acquiring startups. At every step there are gaps and pitfalls. Adoption is the acid test of innovation. Idea-
openaire +1 more source
New Electronics, 2018
LAST MONTH, EMBEDDED WORLD ONCE AGAIN DEMONSTRATED WHY IT’S REGARDED AS THE LEADING EXHIBITION FOR THE INTERNATIONAL EMBEDDED COMMUNITY.
openaire +1 more source
LAST MONTH, EMBEDDED WORLD ONCE AGAIN DEMONSTRATED WHY IT’S REGARDED AS THE LEADING EXHIBITION FOR THE INTERNATIONAL EMBEDDED COMMUNITY.
openaire +1 more source
Security Aspects for Secure Download of Regulated Software
2007Software can be found in a lot of different infrastructures in our daily life e.g. mobile phones, cars, or ticket machines. Due to always increasing requirements or failures in programs, updates are needed at all times and mean a great cost and time advantage.
Sibylle Hick, Christoph Ruland
openaire +1 more source
Systematic Literature Review on Security Risks and its Practices in Secure Software Development
IEEE Access, 2022Rafiq Ahmad Khan +2 more
exaly
Security in agile software development: A practitioner survey
Information and Software Technology, 2021Kalle Rindell +2 more
exaly
Systematic Mapping Study on Security Approaches in Secure Software Engineering
IEEE Access, 2021Rafiq Ahmad Khan +2 more
exaly
Security Assurance Model of Software Development for Global Software Development Vendors
IEEE Access, 2022Rafiq Ahmad Khan +2 more
exaly

