Sciweavers

5843 search results - page 114 / 1169
» Software Security in Practice
Sort
View
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 4 months ago
Web Application Scanners: Definitions and Functions
There are many commercial software security assurance tools that claim to detect and prevent vulnerabilities in application software. However, a closer look at the tools often lea...
Elizabeth Fong, Vadim Okun
SAC
2009
ACM
14 years 5 months ago
Open source vs. closed source software: towards measuring security
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...
Guido Schryen, Rouven Kadura
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
14 years 4 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
TOOLS
1999
IEEE
14 years 2 months ago
Component-Based Software Engineering Processes
Component-based software engineering (CBSE) spans a range of technologies and engineering practices. Engineering practices for component-based systems (e.g., design, integrate, te...
Robert C. Seacord, Kingsley C. Nwosu
ASWEC
2010
IEEE
13 years 10 months ago
Studying Software Evolution for Taming Software Complexity
—Reducing software complexity is key to reducing software maintenance costs. To discover complexity-reducing practices, in this paper we study the evolution of seven sizable open...
Steve D. Suh, Iulian Neamtiu