共 50 条
- [41] A practical framework for dynamically immunizing software security vulnerabilities FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 348 - +
- [42] The Appilication of Fuzzing in Web software security vulnerabilities Test 2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 130 - 133
- [45] Software Architectural Design meets Security Engineering 16TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER BASED SYSTEMS, PROCEEDINGS, 2009, : 109 - 118
- [47] OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities Journal of Information Security and Applications, 2022, 65
- [48] Immersive and Authentic Learning Environments to Mitigate Security Vulnerabilities in Networked Game Devices 2013 INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS (SITIS), 2013, : 1042 - 1048
- [49] Analysis of Models of Security to Mitigate the Risks, Vulnerabilities and Threats in a Company of Services of Telecommunications 2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT 2020), 2020, : 445 - 450
- [50] Solutions for RFID Smart Tagged Card Security Vulnerabilities 2013 AASRI CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL, 2013, 4 : 282 - 287