Common Weakness Enumeration

Results: 22



#Item
1CWE COMPATIBILITY ENFORCEMENT TM AUTOMATED SOURCE CODE ANALYSIS TO ENFORCE CWE COMPATIBILITY STREAMLINE CWE COMPATIBILITY ENFORCEMENT The Common Weakness Enumeration (CWE) compatibility enforcement module reports on data

CWE COMPATIBILITY ENFORCEMENT TM AUTOMATED SOURCE CODE ANALYSIS TO ENFORCE CWE COMPATIBILITY STREAMLINE CWE COMPATIBILITY ENFORCEMENT The Common Weakness Enumeration (CWE) compatibility enforcement module reports on data

Add to Reading List

Source URL: cdn2.hubspot.net

- Date: 2016-10-12 11:19:33
    2Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

    Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

    Add to Reading List

    Source URL: spw16.langsec.org

    Language: English - Date: 2016-06-05 23:38:35
    3Advanced Science and Technology Letters Vol.93 (Security, Reliability and Safety 2015), pp.5-8 http://dx.doi.orgastlA Software Weakness Analysis Technique for Secure Software

    Advanced Science and Technology Letters Vol.93 (Security, Reliability and Safety 2015), pp.5-8 http://dx.doi.orgastlA Software Weakness Analysis Technique for Secure Software

    Add to Reading List

    Source URL: onlinepresent.org

    Language: English - Date: 2015-04-19 22:44:46
    4Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

    Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

    Add to Reading List

    Source URL: www.jocm.us

    Language: English - Date: 2015-03-08 23:14:44
    5Architectural Analysis for Security (AAFS)

    Architectural Analysis for Security (AAFS)

    Add to Reading List

    Source URL: resources.sei.cmu.edu

    Language: English - Date: 2015-05-01 17:51:11
    6STONESOUP Securely Taking On Software of Uncertain Provenance Intelligence Advanced Research Projects Activity STONESOUP Test Case Weakness Variants

    STONESOUP Securely Taking On Software of Uncertain Provenance Intelligence Advanced Research Projects Activity STONESOUP Test Case Weakness Variants

    Add to Reading List

    Source URL: samate.nist.gov

    Language: English - Date: 2015-10-27 14:35:32
    7STONESOUP Securely Taking On Software of Uncertain Provenance Intelligence Advanced Research Projects Activity STONESOUP Phase 3 Test Generation Report

    STONESOUP Securely Taking On Software of Uncertain Provenance Intelligence Advanced Research Projects Activity STONESOUP Phase 3 Test Generation Report

    Add to Reading List

    Source URL: samate.nist.gov

    Language: English - Date: 2015-10-27 14:35:32
    8SUPPLY CHAIN ASSURANCE  They Know Your Weaknesses – Do You?: Reintroducing Common Weakness Enumeration Yan Wu, Bowling Green State University Irena Bojanova, University of Maryland, Baltimore County

    SUPPLY CHAIN ASSURANCE They Know Your Weaknesses – Do You?: Reintroducing Common Weakness Enumeration Yan Wu, Bowling Green State University Irena Bojanova, University of Maryland, Baltimore County

    Add to Reading List

    Source URL: static1.1.sqspcdn.com

    Language: English - Date: 2015-09-09 02:31:41
    9Veracode Summary Report  Summary Report As of 18 Mar 2016 Prepared for: Prepared on:

    Veracode Summary Report Summary Report As of 18 Mar 2016 Prepared for: Prepared on:

    Add to Reading List

    Source URL: owncloud.com

    Language: English - Date: 2016-04-06 15:04:57
    10Lightweight Formal Models of Software Weaknesses Robin Gandhi, Harvey Siy, Yan Wu College of Information Science and Technology University of Nebraska at Omaha, USA {rgandhi, hsiy, ywu}@unomaha.edu definitions. Consider

    Lightweight Formal Models of Software Weaknesses Robin Gandhi, Harvey Siy, Yan Wu College of Information Science and Technology University of Nebraska at Omaha, USA {rgandhi, hsiy, ywu}@unomaha.edu definitions. Consider

    Add to Reading List

    Source URL: faculty.ist.unomaha.edu

    Language: English - Date: 2013-05-29 09:13:46