Sciweavers

5843 search results - page 28 / 1169
» Software Security in Practice
Sort
View
SPE
2011
13 years 2 months ago
Sharing experiments using open-source software
Adam Nelson, Tim Menzies, Gregory Gay
BIS
2009
112views Business» more  BIS 2009»
13 years 5 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
SOFTWARE
2002
13 years 7 months ago
Building Software Securely from the Ground Up
Anup K. Ghosh, Chuck Howell, James A. Whittaker
SOFTWARE
2002
13 years 7 months ago
Composing Security-Aware Software
Khaled M. Khan, Jun Han
WORM
2003
13 years 9 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...