Methods for the prevention, detection and removal of software security vulnerabilities
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Rules of thumb for secure software engineering
Proceedings of the 27th international conference on Software engineering
Secure Software Development by Example
IEEE Security and Privacy
Towards a measuring framework for security properties of software
Proceedings of the 2nd ACM workshop on Quality of protection
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Moving beyond security tracks: integrating security in cs0 and cs1
Proceedings of the 39th SIGCSE technical symposium on Computer science education
Extreme programming security practices
XP'07 Proceedings of the 8th international conference on Agile processes in software engineering and extreme programming
Addressing software application security issues
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
Legal concepts meet technology: a 50-state survey of privacy laws
Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies
Addressing malicious code in COTS: a protection framework
ICCBSS'05 Proceedings of the 4th international conference on COTS-Based Software Systems
Delegating secure logging in pervasive computing systems
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Tampering with motes: real-world physical attacks on wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Evaluating interactive support for secure programming
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Interactive support for secure programming education
Proceeding of the 44th ACM technical symposium on Computer science education
Hi-index | 0.00 |