注册
/
登录
高级搜索
开启搜索历史记录
删除搜索历史记录.
搜索历史记录选项已关闭,请开启搜索历史记录选项。
我的图书馆
Your browser does not support JavaScript, or it is disabled. JavaScript must be enabled in order to view listings.
Towards supporting software assurance assessments by detecting security patterns
作者: Michaela Bunke ,
Karsten Sohr
DOI:
10.1007/S11219-019-09492-Z
关键词:
摘要:
保存
引用
反馈
分享
想要
索引来源
2
下载资源
2
uni-trier.de
本地加速
springer.com
本地加速
doi.org
PDF
下载加速
sci-hub.st
HTML
下载加速
参考文章
(62)
1.
Karsten Sohr, Michaela Bunke,
An architecture-centric approach to detecting security patterns in software
international conference on engineering secure software and systems.
pp. 156- 166 ,(2011) ,
10.5555/1946341.1946357
2.
Damien Octeau, William Enck, Patrick McDaniel, Swarat Chaudhuri,
A study of android application security
usenix security symposium.
pp. 21- 21 ,(2011)
3.
Jing Dong, Yajing Zhao, Tu Peng,
Architecture and Design Pattern Discovery Techniques - A Review.
Software Engineering Research and Practice.
pp. 621- 627 ,(2007)
4.
Christopher Steel, Ramesh Nagappan, Ray Lai,
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
,(2005)
5.
C. Kramer, L. Prechelt,
Design recovery by automated search for structural design patterns in object-oriented software
working conference on reverse engineering.
pp. 208- 215 ,(1996) ,
10.1109/WCRE.1996.558905
6.
Eduardo Fernandez, Duane Hybertson, Markus Schumacher, Frank Buschmann,
Security Patterns: Integrating Security and Systems Engineering
,(2006)
7.
H. S. Heaps,
Information retrieval, computational and theoretical aspects
,(1978)
8.
Raja Vallée-Rai, Etienne Gagnon, Laurie Hendren, Patrick Lam, Patrice Pominville, Vijay Sundaresan,
Optimizing Java Bytecode Using the Soot Framework: Is It Feasible?
compiler construction.
pp. 18- 34 ,(2000) ,
10.1007/3-540-46423-9_2
9.
Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, David Wagner,
An Empirical Study on the Effectiveness of Security Code Review
Lecture Notes in Computer Science.
pp. 197- 212 ,(2013) ,
10.1007/978-3-642-36563-8_14
10.
Damien Octeau, Yves Le Traon, Eric Bodden, Alexandre Bartel, Patrick McDaniel, Jacques Klein, Somesh Jha,
Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis
usenix security symposium.
pp. 543- 558 ,(2013)
来源期刊
Software Quality Journal
Springer Science and Business Media LLC
2020 年,
Volume: 28, Issue: 4,
Page: 1711-1753
相似文章
0
我的图书馆
我的账户
注册
登录
Copyright 2023 ©KipHub.
高级搜索
查找文章
包含所有这些词
包含完全匹配的短语
包含至少一个这些词
不包含这些词
词语出现的位置
任意位置
标题中
显示以下作者所著的文章:
例如:
丁肇中
或
"PJ Hayes"
显示以下刊物上的文章:
例如:
《学术探索》
或
《Nature》
显示在此期间发表的文章:
—
例如:
1996
百变星君
加载中...