Sciweavers

2 search results - page 1 / 1
» Protection Poker: Structuring Software Security Risk Assessm...
Sort
View
ESSOS
2009
Springer
13 years 11 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
BMCBI
2010
178views more  BMCBI 2010»
13 years 5 months ago
CNV Workshop: an integrated platform for high-throughput copy number variation discovery and clinical diagnostics
Background: Recent studies have shown that copy number variations (CNVs) are frequent in higher eukaryotes and associated with a substantial portion of inherited and acquired risk...
Xiaowu Gai, Juan C. Perin, Kevin Murphy, Ryan O'Ha...