Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Hibshi, Hanan"'
Autor:
McCormack, Ian, Dougan, Tomas, Estep, Sam, Hibshi, Hanan, Aldrich, Jonathan, Sunshine, Joshua
The Rust programming language restricts aliasing to provide static safety guarantees. However, in certain situations, developers need to bypass these guarantees by using a set of unsafe features. If they are used incorrectly, these features can reint
Externí odkaz:
http://arxiv.org/abs/2404.02230
The crowd sourced security industry, particularly bug bounty programs, has grown dramatically over the past years and has become the main source of software security reviews for many companies. However, the academic literature has largely omitted sec
Externí odkaz:
http://arxiv.org/abs/2204.12601
Information about the privacy and security of Internet of Things (IoT) devices is not readily available to consumers who want to consider it before making purchase decisions. While legislators have proposed adding succinct, consumer accessible, label
Externí odkaz:
http://arxiv.org/abs/2002.04631
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Breaux, Travis D., Hibshi, Hanan
Naval Postgraduate School Acquisition Research Program
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2778::9a6c9cbd3fb110722d72f684cda93cfd
https://hdl.handle.net/10945/62966
https://hdl.handle.net/10945/62966
Autor:
Hibshi, Hanan, Breaux, Travis D.
Like any organization, the DoD still relies on security analysts who can ensure that security requirements are satisfied. Relying on one expert’s opinion can be risky, because the degree of uncertainty involved in a single person’s decision could
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2778::d3ea52ed9cf7d92cce1a4bd6e53439dc
https://hdl.handle.net/10945/62895
https://hdl.handle.net/10945/62895
Autor:
Hibshi, Hanan
Providing secure solutions for information systems relies on decisions made by expert security professionals. These professionals must be capable of aligning threats to existing vulnerabilities to provide mitigations needed to minimize security risks
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4064cff224287fd5b848fcda44dfd787
Autor:
Breaux, Travis1 breaux@cs.cmu.edu, Hibshi, Hanan1 hhibshi@cmu.edu, Rao, Ashwini1 arao@cmu.edu
Publikováno v:
Requirements Engineering. Sep2014, Vol. 19 Issue 3, p281-307. 27p.
Autor:
Hibshi, Hanan, Breaux, Travis D.
The U.S. DoD transition to a multi-tier, risk management framework aims to streamline information assurance assessments by promoting alignment with NIST information assurance control sets. While these control sets are broadly applicable and comprehen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2778::cc046b42207099cd47a16dd6709dba36
https://hdl.handle.net/10945/58839
https://hdl.handle.net/10945/58839
Publikováno v:
2015 IEEE 23rd International Requirements Engineering Conference (RE); 2015, p166-175, 10p