Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report
IEEE Security and Privacy
Misuse and Abuse Cases: Getting Past the Positive
IEEE Security and Privacy
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
Guest Editors' Introduction: Why Attacking Systems Is a Good Idea
IEEE Security and Privacy
Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns
IEEE Security and Privacy
Taking a Lesson from Stealthy Rootkits
IEEE Security and Privacy
Risk Analysis in Software Design
IEEE Security and Privacy
IEEE Security and Privacy
IEEE Security and Privacy
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Knowledge for Software Security
IEEE Security and Privacy
Automatic discovery of API-level exploits
Proceedings of the 27th international conference on Software engineering
Towards agile security assurance
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Secure Software Development by Example
IEEE Security and Privacy
Risky trust: risk-based analysis of software systems
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Matching attack patterns to security vulnerabilities in software-intensive system designs
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Bridging the Gap between Software Development and Information Security
IEEE Security and Privacy
A threat-driven approach to modeling and verifying secure software
Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering
Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors
IEEE Security and Privacy
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Towards a structured unified process for software security
Proceedings of the 2006 international workshop on Software engineering for secure systems
Extending XP practices to support security requirements engineering
Proceedings of the 2006 international workshop on Software engineering for secure systems
Adding information assurance to the curriculum
Journal of Computing Sciences in Colleges
Application layer intrusion detection for SQL injection
Proceedings of the 44th annual Southeast regional conference
Defining Misuse within the Development Process
IEEE Security and Privacy
On-Chip Communication Architectures: System on Chip Interconnect
On-Chip Communication Architectures: System on Chip Interconnect
CuPIDS: An exploration of highly focused, co-processor-based information system protection
Computer Networks: The International Journal of Computer and Telecommunications Networking
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Securing web applications with static and dynamic information flow tracking
PEPM '08 Proceedings of the 2008 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation
Security Strength Measurement for Dongle-Protected Software
IEEE Security and Privacy
Moving beyond security tracks: integrating security in cs0 and cs1
Proceedings of the 39th SIGCSE technical symposium on Computer science education
Vulnerabilities in e-governments
International Journal of Electronic Security and Digital Forensics
Why is Security a Software Issue?
The EDP Audit, Control, and Security Newsletter
The Quest for Multi-headed Worms
DIMVA '08 Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Is complexity really the enemy of software security?
Proceedings of the 4th ACM workshop on Quality of protection
Security Analysis of an IP Phone: Cisco 7960G
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
Automatic generation of XSS and SQL injection attacks with goal-directed model checking
SS'08 Proceedings of the 17th conference on Security symposium
Robustness to Code and Data Deletion in Autocatalytic Quines
Transactions on Computational Systems Biology X
Secure Software Engineering: Learning from the Past to Address Future Challenges
Information Security Journal: A Global Perspective
ESSoS '09 Proceedings of the 1st International Symposium on Engineering Secure Software and Systems
Hardware-assisted run-time monitoring for secure program execution on embedded processors
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Research on software design level security vulnerabilities
ACM SIGSOFT Software Engineering Notes
Moving from Requirements to Design Confronting Security Issues: A Case Study
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part II
Internet-voting: opportunity or threat for democracy?
VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity
Combining hardware and software instrumentation to classify program executions
Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering
Multi-vendor penetration testing in the advanced metering infrastructure
Proceedings of the 26th Annual Computer Security Applications Conference
Enforcing kernel constraints by hardware-assisted virtualization
Journal in Computer Virology
Addressing software application security issues
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
Security mutation testing of the FileZilla FTP server
Proceedings of the 2011 ACM Symposium on Applied Computing
A security-aware refactoring tool for Java programs
Proceedings of the 4th Workshop on Refactoring Tools
Java type confusion and fault attacks
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Addressing malicious code in COTS: a protection framework
ICCBSS'05 Proceedings of the 4th international conference on COTS-Based Software Systems
Enhancing the accuracy of network-based intrusion detection with host-based context
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Quantitative evaluation of systems with security patterns using a fuzzy approach
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
TAM2: automated threat analysis
Proceedings of the 27th Annual ACM Symposium on Applied Computing
A survey of client-side Web threats and counter-threat measures
Security and Communication Networks
Proceeding of the 44th ACM technical symposium on Computer science education
An extensible pattern-based library and taxonomy of security threats for distributed systems
Computer Standards & Interfaces
Hi-index | 0.00 |