Results 271 to 280 of about 5,764,266 (332)
Some of the next articles are maybe not open access.

Toward a Context-Based Approach for Software Security Learning

Journal of Applied Security Research, 2019
Learning software security is one of the most challenging tasks in the information technology sector due to the vast amount of security knowledge and the difficulties in understanding its practical applications.
Shao-Fang Wen, Basel Katt
semanticscholar   +1 more source

Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools

Annual International Computer Software and Applications Conference, 2018
Consistent growth in the software sector of the world economies has attracted both targeted and mass-scale attacks by cybercriminals. Producing reliable and secure software is difficult because of its growing complexity and the increasing number of ...
R. Parizi   +4 more
semanticscholar   +1 more source

Software security

Proceedings of the companion publication of the 2014 ACM SIGPLAN conference on Systems, Programming, and Applications: Software for Humanity - SPLASH '14, 2014
Where do security technologies come from? Academics propose research and government (sometimes) funds it. Startups move technologies across the "research valley of death" to early adopters. Global corporations make technology widely available by acquiring startups. At every step there are gaps and pitfalls. Adoption is the acid test of innovation. Idea-
openaire   +1 more source

Software security is software reliability

Communications of the ACM, 2006
Enlist hacker expertise, but stay with academic fault naming conventions, when defending against the risk of exploitation of vulnerabilities and intrusions.
openaire   +1 more source

Software Security

2023
Tawseef Ahmed Teli   +3 more
  +4 more sources

Software Security Engineering

2006
The rapid development and expansion of network-based applications have changed the computing world in the last decade. However, this overwhelming success has an Achilles’ heel: most software-controlled systems are prone to attacks both by internal and external users of the highly connected computing systems.
Mohammad Zulkernine, Sheikh I. Ahamed
openaire   +1 more source

SECURE SOFTWARE DEVELOPMENT SOFTWARE

Recent Scientific Investigation, 2023
openaire   +1 more source

Developing Secure Software

2015
Some organizations take the view that features are the most important delivery and with limited time and resources, this becomes the focus. At the end, security is added in. The problem with this approach is that deployment may occur with little to no security features. This ensures that the software is defenseless or near defenseless against attackers
openaire   +1 more source

Secure Software Flashing

SAE International Journal of Passenger Cars - Electronic and Electrical Systems, 2009
<div class="htmlview paragraph">An increasing number of vehicular electronic control units (ECU) are equipped with reprogrammable flash memory. The software program in the flash memory determines the behavior of the ECU. The program code usually can be updated via a bootloader, e.g., for a firmware update, a bug fix, or an update enabling ...
openaire   +1 more source

Software security vulnerabilities

Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018
The security of a company's software products is of paramount importance, of course, and arguably even more important than software reliability and the other key quality attributes. But companies are currently faced with a troublesome dilemma: Supplying customers with more features at greater speeds than in the past has become the norm; high feature ...
openaire   +1 more source

Home - About - Disclaimer - Privacy