Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
18
click to vote
IEEESP
2006
55
views
more
IEEESP 2006
»
Speaking of Privacy
13 years 11 months ago
Download
autoid.mit.edu
Carl E. Landwehr
claim paper
Read More »
18
click to vote
IEEESP
2006
68
views
more
IEEESP 2006
»
Essential Factors for Successful Software Security Awareness Training
13 years 11 months ago
Download
www.cigital.com
Kenneth R. van Wyk, John Steven
claim paper
Read More »
11
click to vote
IEEESP
2006
50
views
more
IEEESP 2006
»
RFID malware: truth vs. myth
13 years 11 months ago
Download
autoid.mit.edu
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
claim paper
Read More »
12
click to vote
IEEESP
2006
47
views
more
IEEESP 2006
»
Web services policies
13 years 11 months ago
Download
labs.oracle.com
Anne Anderson
claim paper
Read More »
16
click to vote
IEEESP
2006
54
views
more
IEEESP 2006
»
Weak Links, Strong Ties
13 years 11 months ago
Download
www.cisl.columbia.edu
George Cybenko
claim paper
Read More »
10
click to vote
IEEESP
2006
42
views
more
IEEESP 2006
»
Web application security engineering
13 years 11 months ago
Download
nob.cs.ucdavis.edu
J. D. Meier
claim paper
Read More »
24
click to vote
IEEESP
2006
54
views
more
IEEESP 2006
»
Putting the tools to work: how to succeed with source code analysis
13 years 11 months ago
Download
www.cigital.com
Pravir Chandra, Brian Chess, John Steven
claim paper
Read More »
28
click to vote
IEEESP
2006
108
views
more
IEEESP 2006
»
Defining Misuse within the Development Process
13 years 11 months ago
Download
www.cigital.com
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
claim paper
Read More »
21
click to vote
IEEESP
2006
64
views
more
IEEESP 2006
»
Desert Island Books
13 years 11 months ago
Download
www.cs.virginia.edu
Eugene H. Spafford
claim paper
Read More »
22
click to vote
IEEESP
2006
53
views
more
IEEESP 2006
»
Fitting Square Pegs into Round Holes
13 years 11 months ago
Download
www.crds.org
Luther Martin
claim paper
Read More »
« first
‹ previous
1
2
3
4
next ›
last »