Treffer 1 - 20 von 1.931

1

Fifty Years of Open Source Software Supply-Chain Security.
Cox, Russ
Communications of the ACM. Oct2025, Vol. 68 Issue 10, p88-95. 8p.

Open source software Computer security vulner... Computer software securi... Kernel operating systems Honeywell International...
Zeitschrift
2

Stop Using Vulnerability Counts to Measure Software Security.
Meneely, Andy ; Keller, Brandon
Communications of the ACM. Sep2025, Vol. 68 Issue 9, p34-36. 3p.

Computer security vulner... Corporate culture Computer software securi... Software measurement Software architecture Internet security
Zeitschrift
3

A detailed guide to the OWASP top 10
Detailed guide to the Open Worldwide Application Security Project top 10

Packt Publishing, publisher, production company. ; Oni, Alexander, on-screen presenter, instructor.

Video
4

Practical Bootcamp JWT authentication with Java and SpringBoot
API security: JWT & SpringBoot

Packt Publishing, publisher, production company. ; Pandey, Ranjan, speaker, instructor.

Video
5

Java Source Code Vulnerability Detection Using Large Language Model.
Anbiya, Dhika Rizki ; Ferdinan, Teddy ; Kołaczek, Grzegorz
Procedia Computer Science. 2025, Vol. 270, p2828-2837. 10p.

Language models Computer software securi... Java programming languag... Penetration testing (Com...
Fachzeitschrift
6

Investigating the Inconsistency of Errors Between CAs in the Wild for Trustworthiness Evaluation in Cross-Domain Authentication.
Kakei, Shohei ; Shiraishi, Yoshiaki ; Saito, Shoichi
Procedia Computer Science. 2025, Vol. 270, p1002-1011. 10p.

Cyber physical systems Certification agencies Error rates Computer software securi... Trust Authentication (Law)
Fachzeitschrift
7

REAL-TIME TRAFFIC-BASED DETECTION OF XSS VULNERABILITIES VIA BIDIRECTIONAL HTTP TRAFFIC ANALYSIS.
Roubi, Anas ; Amin, Muhalim Mohamed
International Journal on Information Technologies & Security. 2025, Vol. 17 Issue 4, p69-78. 10p.

Computer software securi... Real-time computing Risk assessment Detection algorithms Internet protocols Deep packet inspection (...
Fachzeitschrift
8

An Integrated Secure Software Vulnerability Framework for Security in Web Application.
Viswanathan, Ganesh ; Prabhu, J.
International Journal of Reliability, Quality & Safety Engineering. Jan2026, p1. 13p.

Computer security vulner... Data integrity Risk assessment Website security Computer software securi... Software architecture
Fachzeitschrift
9

HVDet: Heap Vulnerability Detection Method Based on P-PDG Representation and Bi-GRU Algorithm.
Ren, Rong ; Wu, Jingyi ; Zhang, Bing ; et al.
International Journal of Software Engineering & Knowledge Engineering. Jan2026, p1-30. 30p. 16 Illustrations.

Computer security vulner... Data structures Algorithms Computer software securi... Penetration testing (Com...
Fachzeitschrift
10

The Security Jawbreaker.
Vachon, Phil
Communications of the ACM. Apr2024, Vol. 67 Issue 4, p46-48. 3p.

Security management Business enterprises Computer access control Computer network securit... Home security measures Computer software securi...
Zeitschrift
11

Local Reasoning Can Help Prove Correctness.
Teodorescu, Lucian Radu ; Parent, Sean
Overload. Aug2025, Issue 188, p4-8. 5p.

Computer software develo... Software verification Applied sciences Subroutines (Computer pr... Computer software securi... Abstraction (Computer sc...
Zeitschrift
12

Software anomaly detection technology based on deep learning.
Long, Guangtao ; Yu, Kai ; Yang, Shengfeng ; et al.
Procedia Computer Science. 2025, Vol. 259, p1123-1129. 7p.

Anomaly detection (Compu... Artificial intelligence Computer software securi... Application software Computer software Deep learning
Fachzeitschrift
13

Editorial Introduction.
Zwass, Vladimir
Journal of Management Information Systems; 2025, Vol. 42 Issue 4, p983-986, 4p

RECOMMENDER systems GENERATIVE artificial in... FAKE news ETHICAL problems COMPUTER software securi... INFORMATION storage & re...
Fachzeitschrift
14

JPMorgan-Backed Exein Raises €100 Million to Halt Car Hackers.
Henderson, Rose
Bloomberg.com. 12/18/2025, pN.PAG-N.PAG. 1p.

Smart devices Computer hacking Corporate investments Internet security Computer software securi... European Union countries
Zeitschrift
15

Apple Makes Changes to iOS Software in Face of Stricter Japanese Rules.
Kelly, Samantha
Bloomberg.com. 12/17/2025, pN.PAG-N.PAG. 1p.

Product safety Application stores Payment systems Computer software securi... iPhone software Statutes
Zeitschrift
16

AI coding tools exploded in 2025. The first security exploits show what could go wrong.
Lazzaro, Sage
Fortune.com. 12/16/2025, pN.PAG-N.PAG. 1p.

Computer security vulner... Computer software develo... Cyberterrorism Security systems Computer software securi... Code generators
Zeitschrift
17

Augmented Cyber-physical Model for Real-time Smart-grid Co-simulation.
Gligor, A. ; Dumitru, C.-D. ; Dzitac, S. ; et al.
International Journal of Computers, Communications & Control. Feb2025, Vol. 20 Issue 1, p1-12. 12p.

Renewable energy sources Grids (Cartography) Computer software securi... Communication infrastruc... Virtual reality Cyber physical systems
Fachzeitschrift
18

Attack Surface Score for Software Systems.
Rajbhandari, Yudeep ; Maharjan, Rokin ; Shrestha, Sakshi ; et al.
Future Internet. Jul2025, Vol. 17 Issue 7, p305. 19p.

Computer security vulner... Computer software securi... Penetration testing (Com... Risk assessment Risk management in busin...
Fachzeitschrift
19

Using Artificial Intelligence and SDN for Dynamic Scalable Control of Security Rules: An IoT Security Solution.
Karim, Abderrazek ; Zeroual, Mustapha ; Baddi, Youssef ; et al.
Procedia Computer Science. 2024, Vol. 251, p814-817. 4p.

Artificial intelligence Software-defined network... Software maintenance Computer software securi... Electronic data processi...
Fachzeitschrift
20

Protecting against hidden cyber threats in a cloud-based learning environment of a university.
Madina, Bereke ; Valerii, Lakhno ; Turekulova, Dametken ; et al.
AIP Conference Proceedings; 2026, Vol. 3337 Issue 1, p1-10, 10p

COMPUTER software securi... MALWARE prevention INTRUSION detection syst... HAZARDS INTERNET security VIRTUAL classrooms
Konferenz

Filter