IEEE Software

Results: 1638



#Item
301

2011 IEEE Symposium on Security and Privacy Verification of Information Flow and Access Control Policies with Dependent Types Aleksandar Nanevski Anindya Banerjee IMDEA Software Institute

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2011-04-10 18:06:54
    302

    Poster : Security Quotient - Defined Naga Sushma Devarapalli Student,Software Engineering Santa Clara University

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2014-05-07 16:20:20
      303

      18th IEEE International Conference on Program Comprehension Understanding and Auditing the Licensing of Open Source Software Distributions Daniel M. German† , Massimiliano Di Penta‡ , Julius Davies† † Dept. of C

      Add to Reading List

      Source URL: juliusdavies.ca

      Language: English - Date: 2011-12-12 19:54:34
        304

        . Software Realities Copyright (c) 1998, IEEE Computer Society Author Contact:

        Add to Reading List

        Source URL: www.satisfice.com

        Language: English - Date: 2006-05-23 22:43:50
          305Software architecture / Enterprise architecture / Department of Defense Architecture Framework / IEEE / Architecture framework / KM3 / ISO/IEC 42010 / NATO Architecture Framework / Information technology management / Software engineering / MODAF

          IEEE1471-2000 to MoDAF-AV

          Add to Reading List

          Source URL: www.eclipse.org

          Language: English - Date: 2014-03-11 15:29:15
          306Subroutines / Control flow / Cross-platform software / JavaScript / Callback / Stub / Serialization / Eval / Computing / Software engineering / Computer programming

          Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains James Mickens Microsoft Research Abstract—Pivot is a new JavaScript isolation framework for

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2014-04-21 13:48:10
          307Microsoft Cluster Server / Message Sequence Chart / Mathematics / Computing / Applied mathematics / Formal languages / Automata theory / Model theory

          IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. XX, NO. Y, YEAR 100 Inference of Message Sequence Charts Rajeev Alur, Kousha Etessami, Mihalis Yannakakis

          Add to Reading List

          Source URL: www.cis.upenn.edu

          Language: English - Date: 2006-06-22 11:47:16
          308Software quality / Vulnerability / Buffer overflow / Stack buffer overflow / C dynamic memory allocation / Malware / C / Stack / Computing / Software bugs / Software engineering

          Poster: Targeted Therapy for Program Bugs Qiang Zeng Mingyi Zhao Peng Liu

          Add to Reading List

          Source URL: www.ieee-security.org

          Language: English - Date: 2014-05-07 16:20:28
          309Internet / Cryptographic software / Transmission Control Protocol / Packet switching / Internet Protocol / Packet Processing / Anonymity / Degree of anonymity / Tor / Computer networking / Computing / Internet privacy

          LAP: Lightweight Anonymity and Privacy

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2012-05-22 01:35:47
          310Advanced persistent threat / Hacking / Malware / Computer virus / Vulnerability / Antivirus software / Cyberwarfare / Security / Computer security

          Poster: OpenAPT – Open-Source Advanced Persistent Threat for Academic Research Mordehai Guri, Tom Sela, Yuval Elovici Department of Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva, Israel

          Add to Reading List

          Source URL: www.ieee-security.org

          Language: English - Date: 2013-05-17 10:01:48
          UPDATE