Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Finifter, Matthew"'
Autor:
Finifter, Matthew Smith
Publikováno v:
Finifter, Matthew Smith. (2013). Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities. UC Berkeley: Computer Science. Retrieved from: http://www.escholarship.org/uc/item/970805qg
There is an entire ecosystem of tools, techniques, and processes designed to improve software security by preventing, finding, mitigating, and/or eliminating software vulnerabilities. Software vendors have this entire ecosystem to choose from during
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::92d3b73d53b470c5b50a601ee2de8a64
http://n2t.net/ark:/13030/m5qj7ncv
http://n2t.net/ark:/13030/m5qj7ncv
Publikováno v:
Felt, Adrienne Porter; Egelman, Serge; Finifter, Matthew; Akhawe, Devdatta; & Wagner, David. (2012). How To Ask For Permission. HotSec, Advance online publication, 0. UC Berkeley: Retrieved from: http://www.escholarship.org/uc/item/0zm6t1dg
Application platforms provide applications with accessto hardware (e.g., GPS and cameras) and personal data.Modern platforms use permission systems to protect access to these resources. The nature of these permissionsystems vary widely across platfor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::c24a1bc1c394e7182b553ae862a4393d
http://www.escholarship.org/uc/item/0zm6t1dg
http://www.escholarship.org/uc/item/0zm6t1dg
Autor:
Edmundson, Anne, Holtkamp, Brian, Rivera, Emanuel, Finifter, Matthew, Mettler, Adrian, Wagner, David
Publikováno v:
Engineering Secure Software & Systems (9783642365621); 2013, p197-212, 16p
Publikováno v:
Proceedings of the 1st ACM Workshop: Security & Privacy in Smartphones & Mobile Devices; Oct2011, p3-14, 12p
Publikováno v:
Proceedings of the 6th ACM Symposium: Information, Computer & Communications Security; 3/22/2011, p416-422, 7p
Publikováno v:
Proceedings of the 15th ACM Conference: Computer & Communications Security; 10/27/2008, p161-174, 14p
Autor:
Schulze, Matthias, Reinhold, Thomas
Publikováno v:
Proceedings of the European Conference on Cyber Warfare & Security; 2018, p454-463, 10p, 1 Diagram
Autor:
Alenezi, Mamdouh, Javed, Yasir
Publikováno v:
2016 International Conference on Engineering & MIS (ICEMIS); 2016, p1-5, 5p
Autor:
Martin Libicki
This updated and expanded edition of Cyberspace in Peace and War by Martin C. Libicki presents a comprehensive understanding of cybersecurity, cyberwar, and cyber-terrorism. From basic concepts to advanced principles, Libicki examines the sources and
Autor:
Lillian Ablon, Andy Bogart
Zero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world