Sciweavers

5843 search results - page 33 / 1169
» Software Security in Practice
Sort
View
113
Voted
COMPSAC
2008
IEEE
15 years 4 months ago
Fabrication of Ontology for Security in Health Care Systems
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
J. Indumathi, G. V. Uma
166
Voted
IAW
2003
IEEE
15 years 8 months ago
Insecure Programming: How Culpable is a Language's Syntax?
— Vulnerabilities in software stem from poorly written code. Inadvertent errors may creep in due to programmers not being aware of the security implications of their code. Writin...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
116
Voted
FASE
2005
Springer
15 years 8 months ago
Tools for Secure Systems Development with UML: Security Analysis with ATPs
Jan Jürjens, Pasha Shabalin
135
Voted
SOUPS
2010
ACM
15 years 2 months ago
Improving users' security choices on home wireless networks
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because o...
Justin T. Ho, David Dearman, Khai N. Truong
105
Voted
CSEE
2009
Springer
15 years 9 months ago
Software Engineering: A System Dynamics Simulated Pedagogical Practice
Kumar Saurabh, Balasubramanian Krishnan