Attack patterns

Results: 58



#Item
31Hacking / Technology / Software testing / Management / Threat / Attack patterns / Malware / Vulnerability / Attack / Cyberwarfare / Computer network security / Computer security

OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE FOR RESEARCH AND ENGINEERING OFFICE OF THE DEPUTY ASSISTANT SECRETARY OF DEFENSE FOR SYSTEMS ENGINEERING Supply Chain Attack Patterns: Framework and

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2014-08-06 15:49:17
32Cyberwarfare / Computer network security / CWE / Attack patterns / Vulnerability / Penetration test / Software testing / Hacking / Computer security

Software Assurance Engineering for Attacks Known Threat Actors

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2013-07-08 14:41:53
33Software testing / Computer network security / Statistics / Data security / Intrusion detection system / Anomaly detection / Denial-of-service attack / Attack patterns / Vulnerability / Computer security / Hacking / Cyberwarfare

On Widening the Scope of Attack Recognition Languages Jon Doyle, Howard Shrobe, and Peter Szolovits Massachusetts Institute of Technology Cambridge, MA[removed]May 30, 2000

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2001-01-16 16:05:44
34Software testing / Software bugs / Hacking / Source code / Vulnerability / Attack patterns / Application security / Cross-site scripting / Buffer overflow / Cyberwarfare / Computing / Computer security

Microsoft Word - Fortify_TaxonomyofSoftwareSecurityErrors

Add to Reading List

Source URL: www.hpenterprisesecurity.com

Language: English - Date: 2014-10-01 10:20:24
35Software testing / Systems engineering / Hacking / Software quality / Software bugs / Attack patterns / Vulnerability / Buffer overflow / Application security / Security / Computer security / Cyberwarfare

JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering ©JOT, 2003 Vol. 2, No. 5, September-October[removed]Secure Software

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2007-01-11 19:41:02
36Computer security / Crime prevention / National security / Hacking / Attack patterns / Penetration test / Application security / Threat model / Security engineering / Security / Software testing / Cyberwarfare

The Balance of Secure Development and Secure Operations in the Software Security Equation Sean Barnum The MITRE Corporation

Add to Reading List

Source URL: cybox.mitre.org

Language: English - Date: 2011-10-27 15:29:15
37Software testing / Failure / Vulnerability / Attack patterns / Common Vulnerabilities and Exposures / CWE / Common Weakness Enumeration / Cross-site scripting / Application security / Cyberwarfare / Computer security / Hacking

Studying Software Vulnerabilities Dr. Robin A. Gandhi, Dr. Harvey Siy, and Yan Wu The University of Nebraska at Omaha M

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2010-10-29 15:34:06
38Security / Hacking / Software testing / CVSS / Software quality / Vulnerability / Attack patterns / Common Vulnerabilities and Exposures / Secure coding / Computer security / Cyberwarfare / Computer network security

Standards in reporting Software Flaws: SCAP, CVE and CWE (Part 2) Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T)

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2010-07-21 17:31:15
39Computing / Hacking / Attack patterns / Code injection / Vulnerability / SQL injection / Cross-site scripting / Fault injection / CWE / Software testing / Cyberwarfare / Computer security

CWE[removed]CWE/SANS Top 25 Most Dangerous Programming Errors

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2010-02-12 13:00:39
40Software testing / Hacking / Cross-site scripting / Attack patterns / Vulnerability / Code injection / SQL injection / Buffer overflow / Cross-site request forgery / Cyberwarfare / Computer security / Computing

CWE[removed]CWE/SANS Top 25 Most Dangerous Software Errors

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2011-03-29 14:10:53
UPDATE