搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Yasemin Acar , Sascha Fahl , Michelle L. Mazurek
DOI: 10.1109/SECDEV.2016.013
关键词:
摘要: While researchers have developed many tools, techniques, and protocols for improving software security, exploits and breaches are only becoming more frequent. Some of this gap …
symposium on usable privacy and security,2017, 引用: 20
usenix security symposium,2017, 引用: 4
European Workshop on Usable Security,2017, 引用: 6
source code analysis and manipulation,2017, 引用: 26
symposium on usable privacy and security,2018, 引用: 13
new security paradigms workshop,2017, 引用: 15
international workshop on security,2018, 引用: 6
The Compass,2018, 引用: 18
Proceedings 3rd European Workshop on Usable Security,2018, 引用: 1
arXiv: Cryptography and Security,2018, 引用: 5