Insecure security software?

被引:0
|
作者
机构
来源
IT Archit. | 2006年 / 1卷 / 17期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] FEDTIC: A Security Design for Embedded Systems with Insecure External Memory
    Hong, Mei
    Guo, Hui
    FUTURE GENERATION INFORMATION TECHNOLOGY, 2010, 6485 : 365 - 375
  • [32] Development of a software security assessment instrument to reduce software security risk
    Gilliam, DP
    Kelly, JC
    Powell, JD
    Bishop, M
    PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 144 - 149
  • [33] Software Security for the People: Free and Open Resources for Software Security Training
    Heymann, Elisa R.
    Miller, Barton P.
    IEEE SECURITY & PRIVACY, 2022, 20 (02) : 88 - 95
  • [34] Insecure at last: Losing it in our security-obsessed world.
    Maxwell, Lynne F.
    LIBRARY JOURNAL, 2006, 131 (15) : 77 - 77
  • [36] Using Feature Selection to Identify Chains of Insecure Software Configuration Parameters
    Fulp, Errin W.
    Gage, H. Donald
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 825 - 830
  • [37] Borderline Personality Disorder and Adult Attachment Disturbances: The Security of Being Insecure
    Fossati, Andrea
    Borroni, Serena
    Maffei, Cesare
    JOURNAL OF PERSONALITY DISORDERS, 2011, 25 : 39 - 39
  • [38] Using Intel SGX to Enforce Auditing of Running Software in Insecure Environments
    Pereira, L.
    Ortiz, L.
    Rossi, D.
    Rosa, M.
    Fonseca, K.
    Prado, C.
    Rust, L.
    Britto, A.
    Riella, R.
    2018 16TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2018), 2018, : 243 - 246
  • [39] Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls
    Wright, Craig S.
    Zia, Tanveer A.
    COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS, 2011, 6694 : 206 - 213
  • [40] Software Analysis for Security
    Mancoridis, Spiros
    2008 FRONTIERS OF SOFTWARE MAINTENANCE, 2008, : 109 - 118