Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Threat Modeling
Exploiting Software: How to Break Code
Exploiting Software: How to Break Code
Risk Analysis in Software Design
IEEE Security and Privacy
IEEE Security and Privacy
IEEE Security and Privacy
Context-sensitive program analysis as database queries
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Investigation of IS professionals' intention to practise secure development of applications
International Journal of Human-Computer Studies
Finding security vulnerabilities in java applications with static analysis
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
A Threat Model Driven Approach for Security Testing
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
Towards certifying the testing process of Open-Source Software: New challenges or old methodologies?
FLOSS '09 Proceedings of the 2009 ICSE Workshop on Emerging Trends in Free/Libre/Open Source Software Research and Development
Towards Model-Based Automatic Testing of Attack Scenarios
SAFECOMP '09 Proceedings of the 28th International Conference on Computer Safety, Reliability, and Security
Using w3af to achieve automated penetration testing by live DVD/live USB
Proceedings of the 2009 International Conference on Hybrid Information Technology
Towards improved security criteria for certification of electronic health record systems
Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care
An integrated application of security testing methodologies to e-voting systems
ePart'10 Proceedings of the 2nd IFIP WG 8.5 international conference on Electronic participation
Optimal information security investment with penetration testing
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Systematizing security test case planning using functional requirements phrases
Proceedings of the 33rd International Conference on Software Engineering
Automatic test approach of web application for security (autoinspect)
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
OSS-TMM: Guidelines for Improving the Testing Process of Open Source Software
International Journal of Open Source Software and Processes
Hi-index | 0.00 |
Quality assurance and testing organizations are tasked with the broad objective of assuring that a software application fulfills its functional business requirements. Such testing most often involves running a series of dynamic functional tests, to ensure proper implementation of the applicationýs features. However, because security is not a feature or even a set of features, security testing doesn't directly fit into this paradigm.