My Account Log in

1 option

2016 International Conference on Software Security and Assurance : ICSSA 2016 : proceedings : 24-25 August 2016, St. Pölten, Austria / International Conference on Software Security and Assurance.

IEEE Xplore (IEEE/IET Electronic Library - IEL) Available online

View online
Format:
Book
Conference/Event
Conference Name:
International Conference on Software Security and Assurance, author.
Language:
English
Subjects (All):
Computer software--Reliability--Congresses.
Computer software.
Computer software--Security measures--Congresses.
Physical Description:
1 online resource (ix, 79 pages) : illustrations
Other Title:
2016 International Conference on Software Security and Assurance
Place of Publication:
Los Alamitos, California : IEEE, 2016.
Summary:
Annotation Secure software design architecture Secure software practices Security requirements engineering Security analysis tools and methods Security evaluation criteria and methodology Security education and training Vulnerability, threat, and risk analysis Malware detection intrusion detection Obfuscation and software security Usability of secure software Security awareness for software developers.
Contents:
Applying Internal Interface Diversification to IoT Operating Systems
Defeating the Database Adversary Using Deception - A MySQL Database Honeypot
On the Automation of Security Testing
The Applicability of Fuzzy Rough Classifier for Continuous Person Authentication
Toward Automated Scanning for Code Injection Vulnerabilities in HTML5-Based Mobile Apps
Towards a Methodology for the Development of Secure Cryptographic Software
Security Requirements Engineering: A Systematic Mapping (2010-2015)
An Experimental Approach to Reputation in E-Participation
A Security Analysis of Paid Subscription Video-on-Demand Services for Online Learning
A Framework for Detecting MAC and IP Spoofing Attacks with Network
Characteristics
Assessment of Server State via Inter-Clone Differences
Catch Me if You Can! Transparent Detection of Shellcode
Detection of Man-in-the-Middle Attacks on Industrial Control Network
Overview of Root Causes of Software Vulnerabilities - Technical and User-Side Perspectives
Decoder-Free Sino-Korean Shellcode
Author Index.
Notes:
Description based on publisher supplied metadata and other sources.
Includes index.
ISBN:
9781509043880
1509043888

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account