Approach Uses Software Analysis to Improve Security

被引:0
|
作者
不详
机构
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:17 / 18
页数:2
相关论文
共 50 条
  • [31] Uses of software in Digital Image Analysis: a Forensic Report
    Sharma, Mukesh
    Jha, Shailendra
    SECOND INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING, 2010, 7546
  • [32] Software for Improve the Security of Kubernetes-based CI/CD Pipeline
    Shevchuk, Ruslan
    Karpinski, Mikolaj
    Kasianchuk, Mykhailo
    Yakymenko, Ihor
    Melnyk, Andriy
    Tykhyi, Roman
    Proceedings - International Conference on Advanced Computer Information Technologies, ACIT, 2023, : 420 - 425
  • [33] How to use Software-Defined Networking to Improve Security - a Survey
    Proenca, Jorge
    Cruz, Tiago
    Monteiro, Edmundo
    Simoes, Paulo
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 220 - 228
  • [34] Using Multi-Level Security Annotations to Improve Software Assurance
    Kylikowski, Eryk
    Scandariato, Riccardo
    Joosen, Wouter
    11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, : 471 - 474
  • [35] An empirical study to improve software security through the application of code refactoring
    Mumtaz, Haris
    Alshayeb, Mohammad
    Mahmood, Sajjad
    Niazi, Mahmood
    INFORMATION AND SOFTWARE TECHNOLOGY, 2018, 96 : 112 - 125
  • [36] Software defined network based architecture to improve security in a swarm of drones
    Guerber, Christophe
    Larrieu, Nicolas
    Royer, Mickal
    2019 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS (ICUAS' 19), 2019, : 51 - 60
  • [37] TEACHING SOFTWARE SECURITY: A MULTI-DISCIPLINARY APPROACH
    Schilling, Walter W., Jr.
    Durant, Eric
    2012 ASEE ANNUAL CONFERENCE, 2012,
  • [38] Reducing software security risk through an integrated approach
    Gilliam, DP
    Powell, JD
    Kelly, JC
    Bishop, M
    26TH ANNUAL NASA GODDARD SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2002, : 36 - 42
  • [39] An approach to analyze software security requirements in ABAC model
    Thanh-Nhan Luong
    Dinh-Hieu Vo
    Ninh-Thuan Truong
    PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2019, : 184 - 189
  • [40] A Novel Approach for Acquiring Training and Software Security Requirements
    Fujs, Damjan
    Vrhovec, Simon
    Vavpotic, Damjan
    EUROPEAN INTERDISCIPLINARY CYBERSECURITY - EICC 2020, 2020,