Zobrazeno 1 - 10
of 58
pro vyhledávání: '"Elder, Sarah"'
Security resources are scarce, and practitioners need guidance in the effective and efficient usage of techniques and tools available in the cybersecurity industry. Two emerging tool types, Interactive Application Security Testing (IAST) and Runtime
Externí odkaz:
http://arxiv.org/abs/2312.17726
Autor:
Elder, Sarah, Zahan, Nusrat, Shu, Rui, Metro, Monica, Kozarev, Valeri, Menzies, Tim, Williams, Laurie
CONTEXT: Applying vulnerability detection techniques is one of many tasks using the limited resources of a software project. OBJECTIVE: The goal of this research is to assist managers and other decision-makers in making informed choices about the use
Externí odkaz:
http://arxiv.org/abs/2208.01595
Autor:
Elder, Sarah1 (AUTHOR) seelder@ncsu.edu, Rahman, Md Rayhanur1 (AUTHOR) mrahman@ncsu.edu, Fringer, Gage1 (AUTHOR) gwfringe@alumni.ncsu.edu, Kapoor, Kunal1 (AUTHOR) kkapoor3@alumni.ncsu.edu, Williams, Laurie1 (AUTHOR) laurie_williams@ncsu.edu
Publikováno v:
ACM Computing Surveys. Aug2024, Vol. 56 Issue 8, p1-41. 41p.
Autor:
Elder, Sarah
Vulnerability detection plays a key role in secure software development. There are many different vulnerability detection tools and techniques to choose from, and insufficient information on which vulnerability detection techniques to use and when. T
Externí odkaz:
http://arxiv.org/abs/2103.05160
Lack of security expertise among software practitioners is a problem with many implications. First, there is a deficit of security professionals to meet current needs. Additionally, even practitioners who do not plan to work in security may benefit f
Externí odkaz:
http://arxiv.org/abs/2103.05088
Autor:
Rahman, Akond, Elder, Sarah, Shezan, Faysal Hossain, Frost, Vanessa, Stallings, Jonathan, Williams, Laurie
Infrastructure as code (IaC) scripts are used to automate the maintenance and configuration of software development and deployment infrastructure. IaC scripts can be complex in nature, containing hundreds of lines of code, leading to defects that can
Externí odkaz:
http://arxiv.org/abs/1809.07937
Autor:
Karen D. Calhoun, Kent Key, E. Yvonne Lewis, Susan J Woolford, E. Hill DeLoney, Jennifer Carerra, Joe Hamm, Ella Greene-Moton, Patricia Piechowski, Kaneesha Wallace, Elder Sarah Bailey
Publikováno v:
Journal of Clinical and Translational Science, Vol 3, Pp 96-96 (2019)
OBJECTIVES/SPECIFIC AIMS: o To review the community’s recommendations on how to rebuild trust in the Flint community. o To review effective community engagement strategies utilized with the Flint Special Projects for project conceptualization, part
Externí odkaz:
https://doaj.org/article/dd2f8cdc83e8475d9c7a43ec48427a84
Autor:
Elder, Sarah, Zahan, Nusrat, Shu, Rui, Metro, Monica, Kozarev, Valeri, Menzies, Tim, Williams, Laurie
Publikováno v:
Empirical Software Engineering; Nov2022, Vol. 27 Issue 6, p1-49, 49p
Publikováno v:
The English Journal, 1924 Feb 01. 13(2), 139-142.
Externí odkaz:
https://www.jstor.org/stable/802635
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.