1![CWE COMPATIBILITY ENFORCEMENT TM AUTOMATED SOURCE CODE ANALYSIS TO ENFORCE CWE COMPATIBILITY STREAMLINE CWE COMPATIBILITY ENFORCEMENT The Common Weakness Enumeration (CWE) compatibility enforcement module reports on data CWE COMPATIBILITY ENFORCEMENT TM AUTOMATED SOURCE CODE ANALYSIS TO ENFORCE CWE COMPATIBILITY STREAMLINE CWE COMPATIBILITY ENFORCEMENT The Common Weakness Enumeration (CWE) compatibility enforcement module reports on data](https://www.pdfsearch.io/img/57a7fad3489a3d1faea139727b960cea.jpg) | Add to Reading ListSource URL: cdn2.hubspot.net- Date: 2016-10-12 11:19:33
|
---|
2![Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD](https://www.pdfsearch.io/img/e72c15367362c7b875591d627b30b646.jpg) | Add to Reading ListSource URL: spw16.langsec.orgLanguage: English - Date: 2016-06-05 23:38:35
|
---|
3![Advanced Science and Technology Letters Vol.93 (Security, Reliability and Safety 2015), pp.5-8 http://dx.doi.orgastlA Software Weakness Analysis Technique for Secure Software Advanced Science and Technology Letters Vol.93 (Security, Reliability and Safety 2015), pp.5-8 http://dx.doi.orgastlA Software Weakness Analysis Technique for Secure Software](https://www.pdfsearch.io/img/a47857b134c8ba283bd9b3d264958dc3.jpg) | Add to Reading ListSource URL: onlinepresent.orgLanguage: English - Date: 2015-04-19 22:44:46
|
---|
4![Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya](https://www.pdfsearch.io/img/68bc3a9391e83bda563ee312fcb60f38.jpg) | Add to Reading ListSource URL: www.jocm.usLanguage: English - Date: 2015-03-08 23:14:44
|
---|
5![Architectural Analysis for Security (AAFS) Architectural Analysis for Security (AAFS)](https://www.pdfsearch.io/img/072cd34ba2732cce3da0f0019d9506f2.jpg) | Add to Reading ListSource URL: resources.sei.cmu.eduLanguage: English - Date: 2015-05-01 17:51:11
|
---|
6![STONESOUP Securely Taking On Software of Uncertain Provenance Intelligence Advanced Research Projects Activity STONESOUP Test Case Weakness Variants STONESOUP Securely Taking On Software of Uncertain Provenance Intelligence Advanced Research Projects Activity STONESOUP Test Case Weakness Variants](https://www.pdfsearch.io/img/31bc9bbf62ad5edf7deed572f210e06e.jpg) | Add to Reading ListSource URL: samate.nist.govLanguage: English - Date: 2015-10-27 14:35:32
|
---|
7![STONESOUP Securely Taking On Software of Uncertain Provenance Intelligence Advanced Research Projects Activity STONESOUP Phase 3 Test Generation Report STONESOUP Securely Taking On Software of Uncertain Provenance Intelligence Advanced Research Projects Activity STONESOUP Phase 3 Test Generation Report](https://www.pdfsearch.io/img/5ad350a3535beed6a218b5672bf80a0d.jpg) | Add to Reading ListSource URL: samate.nist.govLanguage: English - Date: 2015-10-27 14:35:32
|
---|
8![SUPPLY CHAIN ASSURANCE They Know Your Weaknesses – Do You?: Reintroducing Common Weakness Enumeration Yan Wu, Bowling Green State University Irena Bojanova, University of Maryland, Baltimore County SUPPLY CHAIN ASSURANCE They Know Your Weaknesses – Do You?: Reintroducing Common Weakness Enumeration Yan Wu, Bowling Green State University Irena Bojanova, University of Maryland, Baltimore County](https://www.pdfsearch.io/img/e7959cff5020d640568d938dbcd53264.jpg) | Add to Reading ListSource URL: static1.1.sqspcdn.comLanguage: English - Date: 2015-09-09 02:31:41
|
---|
9![Veracode Summary Report Summary Report As of 18 Mar 2016 Prepared for: Prepared on: Veracode Summary Report Summary Report As of 18 Mar 2016 Prepared for: Prepared on:](https://www.pdfsearch.io/img/502b228859447889da411e651b7a551c.jpg) | Add to Reading ListSource URL: owncloud.comLanguage: English - Date: 2016-04-06 15:04:57
|
---|
10![Lightweight Formal Models of Software Weaknesses Robin Gandhi, Harvey Siy, Yan Wu College of Information Science and Technology University of Nebraska at Omaha, USA {rgandhi, hsiy, ywu}@unomaha.edu definitions. Consider Lightweight Formal Models of Software Weaknesses Robin Gandhi, Harvey Siy, Yan Wu College of Information Science and Technology University of Nebraska at Omaha, USA {rgandhi, hsiy, ywu}@unomaha.edu definitions. Consider](https://www.pdfsearch.io/img/310b053af4a8b0ec06faf7d675c53ad6.jpg) | Add to Reading ListSource URL: faculty.ist.unomaha.eduLanguage: English - Date: 2013-05-29 09:13:46
|
---|