Sciweavers

5843 search results - page 28 / 1169
» Software Security in Practice
Sort
View
SPE
2011
14 years 10 months ago
Sharing experiments using open-source software
Adam Nelson, Tim Menzies, Gregory Gay
BIS
2009
112views Business» more  BIS 2009»
15 years 1 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
SOFTWARE
2002
15 years 3 months ago
Building Software Securely from the Ground Up
Anup K. Ghosh, Chuck Howell, James A. Whittaker
SOFTWARE
2002
15 years 3 months ago
Composing Security-Aware Software
Khaled M. Khan, Jun Han
WORM
2003
15 years 5 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...