Attack patterns

Results: 58



#Item
41Software testing / Security / Hacking / Software quality / Vulnerability / Attack patterns / Penetration test / Common Vulnerabilities and Exposures / CVSS / Computer security / Cyberwarfare / Computer network security

Software Assurance Countermeasures in Program Protection Planning MARCH[removed]Deputy Assistant Secretary of Defense for Systems Engineering

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2014-03-27 16:11:00
42Structure / Object-oriented programming / Software design / Pattern language / Attack patterns / Data mining / Security Patterns / Design Patterns / Frame language / Software engineering / Software design patterns / Design

Future Directions for Research on Cyberpatterns Clive Blackwell and Hong Zhu Abstract As patterns in cyberspace, cyberpatterns shed light on research on the development of cyber systems from a new angle. They can help us

Add to Reading List

Source URL: cms.brookes.ac.uk

Language: English - Date: 2014-01-26 12:38:10
43Software design patterns / Design / Software development / Object-oriented programming / Pattern matching / Attack patterns / Pattern / Design Patterns / Software design / Software engineering / Computing / Computer programming

Cyberpatterns 2012 Proceedings of the First International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns 9-10 July 2012

Add to Reading List

Source URL: compeng.ulster.ac.uk

Language: English - Date: 2013-08-13 11:32:10
44Software design patterns / Design / Software development / Object-oriented programming / Pattern matching / Attack patterns / Pattern / Design Patterns / Software design / Software engineering / Computing / Computer programming

Cyberpatterns 2012 Proceedings of the First International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns 9-10 July 2012

Add to Reading List

Source URL: tech.brookes.ac.uk

Language: English - Date: 2012-07-07 07:31:16
45Computer network security / Cyberwarfare / Security / Software quality / National security / Attack patterns / Software assurance / Vulnerability / Penetration test / Software testing / Computer security / Hacking

An Introduction to Attack Patterns as a Software Assurance Knowledge Resource OMG Software Assurance Workshop 2007

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2007-03-13 14:59:21
46Software testing / Computing / Computer network security / Attack patterns / Vulnerability / Application security / Exploit / Buffer overflow / SQL injection / Cyberwarfare / Computer security / Hacking

Attack Patterns as a Knowledge Resource for Building Secure Software Sean Barnum Amit Sethi

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2007-03-13 14:59:22
47Cyberwarfare / Security / Computer network security / National security / Attack patterns / Vulnerability / Software assurance / Hacking / Software testing / Computer security

Attack Patterns: Knowing Your Enemy in Order to Defeat Them BlackHat DC[removed]Software Confidence. Achieved.

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2007-03-13 14:59:22
48Cyberwarfare / Computer network security / CWE / Attack patterns / Vulnerability / Penetration test / Software testing / Hacking / Computer security

Software Assurance Engineering for Attacks Known Threat Actors

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 14:41:53
49Software testing / Cross-platform software / Scripting languages / Hacking / Cross-site scripting / SQL injection / JavaScript / PHP / Attack patterns / Computing / Cyberwarfare / Computer security

Automatic Creation of SQL Injection and Cross-Site Scripting Attacks Adam Kie˙zun Philip J. Guo Karthick Jayaraman

Add to Reading List

Source URL: www.pgbovine.net

Language: English - Date: 2014-01-03 23:24:43
50Cyberwarfare / Computing / Attack patterns / Computer network security / Vulnerability / Attack / Sequence container / Hacking / Software testing / Computer security

Common Attack Pattern Enumeration and Classification (CAPEC™): Schema Description Version 2.6 Schema Element Name Description

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2013-07-25 15:52:47
UPDATE