6   Artículos

 
en línea
Sergiu Zaharia, Traian Rebedea and Stefan Trausan-Matu    
The research presented in the paper aims at increasing the capacity to identify security weaknesses in programming languages that are less supported by specialized security analysis tools, based on the knowledge gathered from securing the popular ones, f... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sergiu Zaharia, Traian Rebedea and Stefan Trausan-Matu    
Software developers represent the bastion of application security against the overwhelming cyber-attacks which target all organizations and affect their resilience. As security weaknesses which may be introduced during the process of code writing are com... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama and Nobukazu Yoshioka    
For effective vulnerability management, vulnerability and attack information must be collected quickly and efficiently. A security knowledge repository can collect such information. The Common Vulnerabilities and Exposures (CVE) provides known vulnerabil... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »