|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1767 occurrences of 913 keywords
|
|
|
Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
89 | Jon Heffley, Pascal Meunier |
Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security? |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
86 | Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker |
Beyond heuristics: learning to classify vulnerabilities and predict exploits. |
KDD |
2010 |
DBLP DOI BibTeX RDF |
SVM, supervised learning, vulnerabilities, exploits |
79 | Hossain Shahriar, Mohammad Zulkernine |
Mutation-Based Testing of Buffer Overflow Vulnerabilities. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
Mutation-based testing, Vulnerabilities, Buffer overflow |
79 | Shuo Chen 0001, Zbigniew Kalbarczyk, Jun Xu 0003, Ravishankar K. Iyer |
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. |
DSN |
2003 |
DBLP DOI BibTeX RDF |
data analysis, security vulnerabilities, finite state machine modeling |
75 | Anil Sharma, Jason R. Martin, Nitin Anand, Michel Cukier, William H. Sanders |
Ferret: A Host Vulnerability Checking Tool. |
PRDC |
2004 |
DBLP DOI BibTeX RDF |
Security auditing tool, host vulnerabilities, security evaluation |
74 | Matin Tamizi, Matt Weinstein, Michel Cukier |
Automated Checking for Windows Host Vulnerabilities. |
ISSRE |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu 0003 |
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
memory corruption, debugging, vulnerability analysis |
60 | Istehad Chowdhury, Mohammad Zulkernine |
Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities? |
SAC |
2010 |
DBLP DOI BibTeX RDF |
security, complexity, empirical study, software metrics, coupling, vulnerability, software security, cohesion |
60 | Gary Wassermann, Zhendong Su 0001 |
Static detection of cross-site scripting vulnerabilities. |
ICSE |
2008 |
DBLP DOI BibTeX RDF |
static analysis, web applications, cross-site scripting, input validation |
60 | Sung-Whan Woo, Omar Hussain Alhazmi, Yashwant K. Malaiya |
Assessing Vulnerabilities in Apache and IIS HTTP Servers. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
56 | Shuo Chen, Hong Chen, Manuel Caballero |
Residue objects: a challenge to web browser security. |
EuroSys |
2010 |
DBLP DOI BibTeX RDF |
component object model (com), residue object, browser security |
56 | Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian |
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Pranith D. Kumar, Anchal Nema, Rajeev Kumar |
Hybrid analysis of executables to detect security vulnerabilities: security vulnerabilities. |
ISEC |
2009 |
DBLP DOI BibTeX RDF |
hybrid analysis, instrumentation, slicing, security vulnerabilities, memory errors |
53 | Kaarina Karppinen, Lyly Yonkwa, Mikael Lindvall |
Why Developers Insert Security Vulnerabilities into Their Code. |
ACHI |
2009 |
DBLP DOI BibTeX RDF |
|
53 | Kwangsun Ko, Insook Jang, Yong-hyeog Kang, JinSeok Lee, Young Ik Eom |
Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Steve Wood, Gordon W. Romney |
Protection methods against IP packet attacks. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
TCP vulnerabilities, UDP vulnerabilities, packet inspection, intrusion detection systems, firewalls, access control list, intrusion prevention systems |
51 | K. Sivakumar, K. Garg |
Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using CWE and CVE. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Secure code, PHP Vulnerabilities, CWE, CVE, Web Security, XSS |
51 | Greg Goth |
Functionality Meets Terminology to Address Network Security Vulnerabilities. |
IEEE Distributed Syst. Online |
2006 |
DBLP DOI BibTeX RDF |
network security vulnerabilities, computer security |
49 | Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan |
An OVAL-based active vulnerability assessment system for enterprise computer networks. |
Inf. Syst. Frontiers |
2008 |
DBLP DOI BibTeX RDF |
Open vulnerability assessment language, Attack path, Network security, Relational database management system, Predicate logic, Security vulnerability |
49 | Aaron Steele |
Ontological Vulnerability Assessment. |
WISE Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Yao-Wen Huang, Fang Yu 0001, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, Sy-Yen Kuo |
Securing web application code by static analysis and runtime protection. |
WWW |
2004 |
DBLP DOI BibTeX RDF |
program security, verification, type systems, information flow, noninterference, web application security, security vulnerabilities |
46 | Pierre Parrend |
Enhancing Automated Detection of Vulnerabilities in Java Components. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Nuno Antunes, Nuno Laranjeiro, Marco Vieira, Henrique Madeira |
Effective Detection of SQL/XPath Injection Vulnerabilities in Web Services. |
IEEE SCC |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Yonesy F. Nunez |
Maximizing an Organization's Information Security Posture by Distributedly Assessing and Remedying System Vulnerabilities. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Jaekwang Kim, Jee-Hyong Lee 0001 |
A methodology for finding source-level vulnerabilities of the Linux kernel variables. |
IJCNN |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Nenad Jovanovic, Christopher Krügel, Engin Kirda |
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Anil Bazaz, James D. Arthur, Joseph G. Tront |
Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Michael Gegick, Laurie A. Williams |
Matching attack patterns to security vulnerabilities in software-intensive system designs. |
ACM SIGSOFT Softw. Eng. Notes |
2005 |
DBLP DOI BibTeX RDF |
security, design, regular expression |
46 | Jedidiah R. Crandall, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
metamorphism, polymorphism, symbolic execution, worms, honeypots, polymorphic worms |
46 | Omar Hussain Alhazmi, Yashwant K. Malaiya, Indrajit Ray |
Security Vulnerabilities in Software Systems: A Quantitative Perspective. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Richard Lippmann, Seth E. Webster, Douglas Stetson |
The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
Internet, network, Intrusion detection, DoS, attack, signature, worm, scan, vulnerability, probe, patch, exploit, false alarm |
44 | Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema |
Vulnerabilities of UMTS Access Domain Security Architecture. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
UMTS vulnerabilities, DoS attacks on UMTS, Security, UMTS |
44 | Ravishankar K. Iyer |
Security vulnerabilities: from measurements to design. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
analysis of security vulnerabilities, masking techniques, runtime detection of security attacks |
44 | Jay-Evan J. Tevis, John A. Hamilton Jr. |
Static analysis of anomalies and security vulnerabilities in executable files. |
ACM Southeast Regional Conference |
2006 |
DBLP DOI BibTeX RDF |
PE format, executable file, software security vulnerabilities, static analysis |
44 | Cindy Cullen |
Internet vulnerabilities of one-time passcode mechanisms. |
LCN |
1995 |
DBLP DOI BibTeX RDF |
one-time passcode mechanisms, passive attack, one-time passcode server, hacker tools, authentication, security of data, vulnerabilities, hackers, user identification |
42 | Thomas A. Gerace, Huseyin Cavusoglu |
The critical elements of the patch management process. |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
42 | V. Benjamin Livshits, Aditya V. Nori, Sriram K. Rajamani, Anindya Banerjee 0001 |
Merlin: specification inference for explicit information flow problems. |
PLDI |
2009 |
DBLP DOI BibTeX RDF |
security analysis tools, specification inference |
42 | Mohammad Ebrahim Rafiei, Mohsen Taherian, Hamid Mousavi, Ali Movaghar 0001, Rasool Jalili |
Vulnerability Analysis in VGBPS Using Prolog. |
FSEN |
2007 |
DBLP DOI BibTeX RDF |
Protection System, Safety Problem, Prolog, Vulnerability Analysis |
42 | David Byers, Shanai Ardi, Nahid Shahmehri, Claudiu Duma |
Modeling Software VulnerabilitiesWith Vulnerability Cause Graphs. |
ICSM |
2006 |
DBLP DOI BibTeX RDF |
vulnerability modeling, software security |
42 | Kanta Jiwnani, Marvin V. Zelkowitz |
Maintaining Software with a Security Perspective. |
ICSM |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Nuno Laranjeiro, Marco Vieira, Henrique Madeira |
Protecting Database Centric Web Services against SQL/XPath Injection Attacks. |
DEXA |
2009 |
DBLP DOI BibTeX RDF |
XPath Injection, Web services, vulnerabilities, SQL Injection, code instrumentation, security attacks |
40 | Ju An Wang, Hao Wang, Minzhe Guo, Min Xia 0004 |
Security metrics for software systems. |
ACM Southeast Regional Conference |
2009 |
DBLP DOI BibTeX RDF |
software quality, software security, security metrics, software vulnerabilities |
40 | Kandha Sankarpandian, Travis Little, W. Keith Edwards |
Talc: using desktop graffiti to fight software vulnerability. |
CHI |
2008 |
DBLP DOI BibTeX RDF |
usable security, internet security, software vulnerabilities, security framework, patch management, home users, graffiti |
40 | Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan |
Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge. |
IEEE Trans. Software Eng. |
2007 |
DBLP DOI BibTeX RDF |
disclosure mechanisms, responsible vulnerability disclosure, game theory, Information security, economic modeling, software vulnerabilities |
40 | Marcelo Masera, Igor Nai Fovino |
A Service-Oriented Approach for Assessing Infrastructure Security. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
systemof- systems, services, attacks, vulnerabilities, threats, Security assessment |
40 | Jayamsakthi Shanmugam, M. Ponnavaikko |
Risk Mitigation for Cross Site Scripting Attacks Using Signature Based Model on the Server Side. |
IMSCCS |
2007 |
DBLP DOI BibTeX RDF |
Application-level web Security, cross-site scripting, security vulnerabilities |
40 | Iván Arce |
The Kernel Craze. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
kernel bugs, kernel security, exploit code, vulnerabilities |
39 | Nam H. Pham, Tung Thanh Nguyen, Hoan Anh Nguyen, Xinying Wang, Anh Tuan Nguyen 0001, Tien N. Nguyen |
Detecting recurring and similar software vulnerabilities. |
ICSE (2) |
2010 |
DBLP DOI BibTeX RDF |
|
39 | Travis D. Breaux, Jonathan D. Lewis, Paul N. Otto, Annie I. Antón |
Identifying vulnerabilities and critical requirements using criminal court proceedings. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Golnaz Elahi, Eric S. K. Yu, Nicola Zannone |
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations. |
ER |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Zhiqiang Lin, Xiangyu Zhang 0001, Dongyan Xu |
Convicting exploitable software vulnerabilities: An efficient input provenance based approach. |
DSN |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Sheraz Naseer, Muhammad Younus, Attiq Ahmed |
Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
IEEE 802.16e security, Multi- and broadcast service shared key vulnerability, WiMAX, DoS Attacks |
39 | Babak Salamat, Andreas Gal, Todd Jackson, Karthikeyan Manivannan, Gregor Wagner, Michael Franz |
Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities. |
CISIS |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Taeshik Shon, Wook Choi |
An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. |
NBiS |
2007 |
DBLP DOI BibTeX RDF |
|
39 | JeongWook Kim, Hyug-Hyun Cho, Gil-Jong Mun, Jae-Hyun Seo, Bong-Nam Noh, Yongmin Kim 0005 |
Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Anil Bazaz, James D. Arthur |
Towards a Taxonomy of Vulnerabilities. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Matthew Van Gundy, Hao Chen 0003, Zhendong Su 0001, Giovanni Vigna |
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Zhiqiang Lin, Bing Mao, Li Xie 0001 |
A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Dave Ahmad |
The Rising Threat of Vulnerabilities Due to Integer Errors. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
|
39 | Robert A. Martin |
Managing Vulnerabilities in Networked Systems. |
Computer |
2001 |
DBLP DOI BibTeX RDF |
|
37 | Daniela E. Popescu, Marcela F. Prada |
About the Buildings' Danger Control Systems Vulnerabilities. |
KES (3) |
2008 |
DBLP DOI BibTeX RDF |
programmable outputs, testability, vulnerabilities, security system |
37 | Mohamed K. Saad, Syed V. Ahamed |
Vulnerabilities of RFID systems in infant abduction protection and patient wander prevention. |
ACM SIGCSE Bull. |
2007 |
DBLP DOI BibTeX RDF |
infant abduction, RFID, vulnerabilities, protection |
37 | Jayamsakthi Shanmugam, M. Ponnavaikko |
A solution to block Cross Site Scripting Vulnerabilities based on Service Oriented Architecture. |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
Application-level web Security, cross-site scripting, security vulnerabilities |
35 | Asmaa Adnane, Christophe Bidan, Rafael Timóteo de Sousa Júnior |
Trust-Based Countermeasures for Securing OLSR Protocol. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Mary Lou Soffa |
Path Sensitive Analysis for Security Flaws. |
HASE |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Alexander M. Hoole, Issa Traoré |
Contract-Based Security Monitors for Service Oriented Software Architecture. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray |
Vulnerability Discovery in Multi-Version Software Systems. |
HASE |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Stefan Kals, Engin Kirda, Christopher Krügel, Nenad Jovanovic |
SecuBat: a web vulnerability scanner. |
WWW |
2006 |
DBLP DOI BibTeX RDF |
automated vulnerability detection, security, crawling, SQL injection, XSS, cross-site scripting, scanner |
35 | Ben Breech, Lori L. Pollock |
A framework for testing security mechanisms for program-based attacks. |
ACM SIGSOFT Softw. Eng. Notes |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Haitao Tian, Liusheng Huang, Zhi Zhou, Yonglong Luo |
Arm up Administrators: Automated Vulnerability Management. |
ISPAN |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Michael Dalton, Hari Kannan, Christos Kozyrakis |
Raksha: a flexible information flow architecture for software security. |
ISCA |
2007 |
DBLP DOI BibTeX RDF |
semantic vulnerabilities, dynamic, software security |
32 | Dzintars Avots, Michael Dalton, V. Benjamin Livshits, Monica S. Lam |
Improving software security with a C pointer analysis. |
ICSE |
2005 |
DBLP DOI BibTeX RDF |
format string violations, security aws, program analysis, programming languages, error detection, dynamic analysis, vulnerabilities, buffer overflows, software security, pointer analysis, context-sensitive, type safety, software errors |
32 | Christian Rinderknecht |
Proving a Soundness Property for the Joint Design of ASN.1 and the Basic Encoding Rules. |
SAM |
2004 |
DBLP DOI BibTeX RDF |
Abstract Syntax Notation One, Basic Encoding Rules, formal methods, protocol, specification, vulnerabilities, BER, ASN.1 |
32 | John Viega, J. T. Bloch, Y. Kohno, Gary McGraw |
ITS4: A Static Vulnerability Scanner for C and C++ Code. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
ITS4, static vulnerability scanner, C++ code, security-critical source code, real-time feedback, e-commerce software, software tools, security of data, software packages, software package, C language, software vulnerabilities, C++ language, C code |
32 | Rodolphe Ortalo, Yves Deswarte, Mohamed Kaâniche |
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. |
IEEE Trans. Software Eng. |
1999 |
DBLP DOI BibTeX RDF |
operational vulnerabilities, privilege graph, quantitative evaluation, Security assessment |
32 | Calvin Ko, Manfred Ruschitzka, Karl N. Levitt |
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
security-critical program execution monitoring, specification-based approach, program vulnerabilities, security specifications, real-time intrusion detection system, Unix setuid root programs, system attack detection, security violations, distributed systems, synchronization, system monitoring, audit trails, formal framework |
32 | Hossain Shahriar, Mohammad Zulkernine |
Automatic Testing of Program Security Vulnerabilities. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Lutz Lowis, Rafael Accorsi |
On a Classification Approach for SOA Vulnerabilities. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | José Fonseca 0002, Marco Vieira |
Mapping software faults with web security vulnerabilities. |
DSN |
2008 |
DBLP DOI BibTeX RDF |
|
32 | David Byers, Nahid Shahmehri |
A Cause-Based Approach to Preventing Software Vulnerabilities. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Security modeling, Software security |
32 | Pierre Parrend, Stéphane Frénot |
Classification of Component Vulnerabilities in Java Service Oriented Programming (SOP) Platforms. |
CBSE |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Wenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia Jia 0001 |
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs. |
ICDCS |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Alaeddine El Fawal, Jean-Yves Le Boudec, Kavé Salamatian |
Vulnerabilities in Epidemic Forwarding. |
WOWMOM |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto |
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Cyril Onwubiko, Andrew P. Lenaghan |
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Niranjan Soundararajan, Angshuman Parashar, Anand Sivasubramaniam |
Mechanisms for bounding vulnerabilities of processor structures. |
ISCA |
2007 |
DBLP DOI BibTeX RDF |
redundant threading, microarchitecture, transient faults |
32 | Ashish Aggarwal, Pankaj Jalote |
Integrating Static and Dynamic Analysis for Detecting Vulnerabilities. |
COMPSAC (1) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Nenad Jovanovic, Christopher Kruegel, Engin Kirda |
Precise alias analysis for static detection of web application vulnerabilities. |
PLAS |
2006 |
DBLP DOI BibTeX RDF |
scripting languages security, static analysis, program analysis, data flow analysis, PHP, alias analysis, cross-site scripting, web application security |
32 | Jun Xu 0003, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt |
Automatic diagnosis and response to memory corruption vulnerabilities. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
attack diagnosis, memory corruption attack, randomization, message filtering |
32 | Rui Costa Cardoso, Mário M. Freire |
Towards Autonomic Minimization of Security Vulnerabilities Exploitation in Hybrid Network Environments. |
ICAS/ICNS |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Annie I. Antón, Julia Brande Earp |
A requirements taxonomy for reducing Web site privacy vulnerabilities. |
Requir. Eng. |
2004 |
DBLP DOI BibTeX RDF |
Security requirements, Privacy requirements |
32 | Jay-Evan J. Tevis, John A. Hamilton Jr. |
Methods for the prevention, detection and removal of software security vulnerabilities. |
ACM Southeast Regional Conference |
2004 |
DBLP DOI BibTeX RDF |
functional programming, static code analysis |
32 | Giuseppe A. Di Lucca, Anna Rita Fasolino, M. Mastoianni, Porfirio Tramontana |
Identifying Cross Site Scripting Vulnerabilities in Web Applications. |
WSE |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Martin C. Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy 0001, Tudor Leu |
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors). |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Ravishankar K. Iyer, Shuo Chen 0001, Jun Xu 0003, Zbigniew Kalbarczyk |
Security Vulnerabilities - From Data Analysis to Protection Mechanisms. |
WORDS Fall |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Ronald W. Ritchey, Paul Ammann |
Using Model Checking to Analyze Network Vulnerabilities. |
S&P |
2000 |
DBLP DOI BibTeX RDF |
|
29 | John Diamant |
Resilient Security Architecture: A Complementary Approach to Reducing Vulnerabilities. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
HP Comprehensive Applications Threat Analysis, W. Edwards Deming, dynamic application security testing, static application security testing, security requirements gap analysis, architectural threat analysis, security quality, zero day, 0-day, software development, security and privacy, security vulnerabilities |
29 | Thomas Zimmermann 0001, Nachiappan Nagappan, Laurie A. Williams |
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista. |
ICST |
2010 |
DBLP DOI BibTeX RDF |
Complexity, Metrics, Prediction, Dependencies, Coverage, Vulnerabilities, Organizational Structure, Churn |
29 | Nuno Seixas, José Fonseca 0002, Marco Vieira, Henrique Madeira |
Looking at Web Security Vulnerabilities from the Programming Language Perspective: A Field Study. |
ISSRE |
2009 |
DBLP DOI BibTeX RDF |
programming languages, field study, software faults, Security vulnerabilities |
29 | Eugene H. Spafford |
Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
security policy, vulnerabilities, patching, cyber security, security education |
Displaying result #1 - #100 of 4178 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|