Treffer 161 - 180 von 34.625

161

Dieses Ergebnis kann Gästen nicht angezeigt werden.

162

Java ME CLDC Security Analysis
Debbabi, Mourad ; Saleh, Mohamed ; Talhi, Chamseddine ; et al.
Embedded Java Security : Security for Mobile Devices. :115-152

E-Book
163

Security enhancements for a user-controlled lightpath provisioning system
Jing Wu ; Savoie, Michel ; Hanxi Zhang ; et al.
2006 International Conference on Computing & Informatics Computing & Informatics, 2006. ICOCI '06. International Conference on. :1-6 Jun, 2006

Konferenz
164

Dieses Ergebnis kann Gästen nicht angezeigt werden.

165

The gateway security model in the Java Electronic Commerce Framework
Theodore Goldstein
Lecture Notes in Computer Science ISBN: 9783540635949

3. Good health
Buch
166

Source Code Analysis for Secure Programming Practices
Yang, Jeong ; Barrientes, Christian ; Sanchez, Joshua ; et al.
2018 International Conference on Computational Science and Computational Intelligence (CSCI) CSCI Computational Science and Computational Intelligence (CSCI), 2018 International Conference on. :819-824 Dec, 2018

Konferenz
167

Dieses Ergebnis kann Gästen nicht angezeigt werden.

168

Coarse Grained Java Security Policies
T. Jensen ; D. Le Métayer ; T. Thorn
Lecture Notes in Computer Science ISBN: 9783540654605

Buch
169

SecureCode v2.0: A Production-Grade Dataset for Training Security-Aware Code Generation Models
Thornton, Scott

Cryptography and Securit... Artificial Intelligence Computation and Language Machine Learning
Report
170

Java and Internet Security
Antti Viljamaa ; Jukka Viljamaa ; The Pennsylvania State University CiteSeerX Archives
http://www.cs.helsinki.fi/group/fred/reports/JavaSecurityReportFinal.ps.gz.

Java Security Cryptography Software Development CR... D.3 D.4.6
Fachzeitschrift
171

A Look at Java Security
Ben Rothke
Information Security Management Handbook, Four Volume Set ISBN: 9780849310683
Information Security Management Handbook, Sixth Edition ISBN: 9780849374951

Buch
172

Are Sparse Autoencoders Useful for Java Function Bug Detection?
Melo, Rui ; Mamede, Claudia ; Catarino, Andre ; et al.

Software Engineering Artificial Intelligence Machine Learning
Report
173

Java Security : From HotJava to Netscape and Beyond
Dean, D. ; Felten, ; Wallach,
Proceedings of the 1996 IEEE Symposium on Security and Privacy. :190

Konferenz
174

SecurityViews: A Dynamic Security for View-Oriented Programming
Mcheick, Hamid ; Dallaire, Eric
2008 International MCETECH Conference on e-Technologies (mcetech 2008) e-Technologies, 2008 International MCETECH Conference on. :243-246 Jan, 2008

Konferenz
175

CryptoNET: a model of generic security provider
ABDUL GHAFOOR ABBASI ; MUFTIC, Sead ; SCHMÖLZER, Gernot
RADIO FREQUENCY IDENTIFICATION APPLICATIONS AND NETWORKS SECURITYInternational journal of internet technology and secured transactions (Print). 2(3-4):321-335

Computer science Informatique Sciences exactes et tech... Exact sciences and techn... Sciences appliquees Applied sciences
Fachzeitschrift
176

Secure Java Development Concepts
Coffin, David ; Coffin, David
Expert Oracle and Java Security : Programming Secure Oracle Database Applications with Java. :27-50

E-Book
177

Dieses Ergebnis kann Gästen nicht angezeigt werden.

179

How Computer Security Works
Cheswick, William ; Bellovin, Steven M. ; Ford, Warwick ; et al.
Scientific American, 1998 Oct 01. 279(4), 106-109.

Fachzeitschrift
180

First step of security model for separation of concerns
Mcheick, Hamid ; Dallaire, Eric ; Mili, Hafedh
2009 IEEE/ACS International Conference on Computer Systems and Applications Computer Systems and Applications, 2009. AICCSA 2009. IEEE/ACS International Conference on. :675-681 May, 2009

Konferenz

Filter