Статті в журналах з теми "Software and application security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Software and application security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Abozeid, Amr, AbdAllah Adel AlHabshy, and Kamal ElDahshan. "A Software Security Optimization Architecture (SoSOA) and its Adaptation for Mobile Applications." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 11 (June 4, 2021): 148. http://dx.doi.org/10.3991/ijim.v15i11.20133.
Повний текст джерелаPeng, Jianping, Meiwen Guo, and Jing Quan. "Software Vulnerability and Application Security Risk." Information Resources Management Journal 32, no. 1 (January 2019): 48–57. http://dx.doi.org/10.4018/irmj.2019010103.
Повний текст джерелаPayne, Jeffery. "Integrating Application Security into Software Development." IT Professional 12, no. 2 (March 2010): 6–9. http://dx.doi.org/10.1109/mitp.2010.58.
Повний текст джерелаShin, Michael E., Hassan Gomaa, Don Pathirage, Chase Baker, and Bhavya Malhotra. "Design of Secure Software Architectures with Secure Connectors." International Journal of Software Engineering and Knowledge Engineering 26, no. 05 (June 2016): 769–805. http://dx.doi.org/10.1142/s021819401650025x.
Повний текст джерелаKarakaneva, J. "Software applications security." Trakia Journal of Science 12, no. 4 (2014): 418–24. http://dx.doi.org/10.15547/tjs.2014.04.012.
Повний текст джерелаHosniara Pervin. "Software as a service and security." World Journal of Advanced Research and Reviews 11, no. 3 (September 30, 2021): 327–31. http://dx.doi.org/10.30574/wjarr.2021.11.3.0459.
Повний текст джерелаAlgarni, Sultan, Fathy Eassa, Khalid Almarhabi, Abdullah Algarni, and Aiiad Albeshri. "BCNBI: A Blockchain-Based Security Framework for Northbound Interface in Software-Defined Networking." Electronics 11, no. 7 (March 23, 2022): 996. http://dx.doi.org/10.3390/electronics11070996.
Повний текст джерелаKhan, Khaled M. "Software Security Engineering." International Journal of Secure Software Engineering 3, no. 1 (January 2012): 62–63. http://dx.doi.org/10.4018/jsse.2012010104.
Повний текст джерелаRauf, Bilal, Haider Abbas, Muhammad Usman, Tanveer A. Zia, Waseem Iqbal, Yawar Abbas, and Hammad Afzal. "Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks." ACM Computing Surveys 54, no. 6 (July 2021): 1–36. http://dx.doi.org/10.1145/3453648.
Повний текст джерелаZhai, Hui, Hui Shi, and Rui Zhai. "The Application of Software Testing Technology on Security in Web Application System." Applied Mechanics and Materials 556-562 (May 2014): 6159–61. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6159.
Повний текст джерелаTiwari, Pradeep Kumar, and Sandeep Joshi. "Data Security for Software as a Service." International Journal of Service Science, Management, Engineering, and Technology 6, no. 3 (July 2015): 47–63. http://dx.doi.org/10.4018/ijssmet.2015070104.
Повний текст джерелаAl-Ahmad, Walid. "Building Secure Software Using XP." International Journal of Secure Software Engineering 2, no. 3 (July 2011): 63–76. http://dx.doi.org/10.4018/jsse.2011070104.
Повний текст джерелаZhou, He. "Application Research on Key Points of Software Security Development Technology." Journal of Physics: Conference Series 2173, no. 1 (January 1, 2022): 012041. http://dx.doi.org/10.1088/1742-6596/2173/1/012041.
Повний текст джерелаAlgarni, Abdullah, Abdulaziz Attaallah, Fathi Eassa, Maher Khemakhem, Kamal Jambi, Hosam Aljihani, Khalid Almarhabi, and Faisal Albalwy. "A security testing mechanism for detecting attacks in distributed software applications using blockchain." PLOS ONE 18, no. 1 (January 20, 2023): e0280038. http://dx.doi.org/10.1371/journal.pone.0280038.
Повний текст джерелаBadgire, Vaishnavi. "Calibration and Asset Management Software." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (August 31, 2021): 2961–66. http://dx.doi.org/10.22214/ijraset.2021.37831.
Повний текст джерелаHe, Cheng, and Yan Fei Liu. "Research on Software Testing to Ensure Web Application Usability, Reliability and Security." Advanced Materials Research 1049-1050 (October 2014): 1972–76. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1972.
Повний текст джерелаAndrian, Rian, and Ahmad Fauzi. "Security Scanner For Web Applications Case Study: Learning Management System." Jurnal Online Informatika 4, no. 2 (February 14, 2020): 63. http://dx.doi.org/10.15575/join.v4i2.394.
Повний текст джерелаAlhirabi, Nada, Omer Rana, and Charith Perera. "Security and Privacy Requirements for the Internet of Things." ACM Transactions on Internet of Things 2, no. 1 (February 2021): 1–37. http://dx.doi.org/10.1145/3437537.
Повний текст джерелаRawat, Sanjay, and Ashutosh Saxena. "Application security code analysis: a step towards software assurance." International Journal of Information and Computer Security 3, no. 1 (2009): 86. http://dx.doi.org/10.1504/ijics.2009.026622.
Повний текст джерелаZhang, Yan Kun. "Computer Network Security Threats and Security Technology Research." Advanced Materials Research 971-973 (June 2014): 1440–43. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1440.
Повний текст джерелаWibisurya, Aswin, and Timothy Yudi Adinugroho. "A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption." ComTech: Computer, Mathematics and Engineering Applications 5, no. 2 (December 1, 2014): 647. http://dx.doi.org/10.21512/comtech.v5i2.2215.
Повний текст джерелаPetukhov, Andrey N., and Paul L. Pilyugin. "”Common Criteria” and Software Defined Network Security." Modeling and Analysis of Information Systems 26, no. 1 (March 15, 2019): 134–45. http://dx.doi.org/10.18255/1818-1015-2019-1-134-145.
Повний текст джерелаZhao, Jing Sheng, Wei Zhang, and Chao Yuan. "Research on Mobile Agent Security of Application Software in Open Platform." Advanced Materials Research 403-408 (November 2011): 1332–36. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1332.
Повний текст джерелаDoan, Thuong, Steven Demurjian, Laurent Michel, and Solomon Berhe. "Integrating Access Control into UML for Secure Software Modeling and Analysis." International Journal of Secure Software Engineering 1, no. 1 (January 2010): 1–19. http://dx.doi.org/10.4018/jsse.2010102001.
Повний текст джерелаLi, Zhong Hua, You Xin Wu, Sheng Hua Xu, and Wei Zhang. "E-Government Application Adaptation and Optimization Based on the Domestic Foundational Software." Applied Mechanics and Materials 411-414 (September 2013): 2167–72. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.2167.
Повний текст джерелаZhu, Xiao Jing, and Yuan Guai Lin. "Analysis of Web Attack and Design of Defense System." Advanced Materials Research 756-759 (September 2013): 2428–32. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2428.
Повний текст джерелаGumerov, Emil A., and Tamara V. Alekseeva. "Development of the blockchain architecture of the Industrial Internet of Things system of the enterprise." Journal Of Applied Informatics 16, no. 95 (October 29, 2021): 16–32. http://dx.doi.org/10.37791/2687-0649-2021-16-5-16-32.
Повний текст джерелаTedyyana, Agus, Fajar Ratnawati, Elgamar Syam, and Fajri Profesio Putra. "Threat modeling in application security planning citizen service complaints." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (November 1, 2022): 1020. http://dx.doi.org/10.11591/ijeecs.v28.i2.pp1020-1027.
Повний текст джерелаSaid, Huwida E., Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian. "Database and database application security." ACM SIGCSE Bulletin 41, no. 3 (August 25, 2009): 90–93. http://dx.doi.org/10.1145/1595496.1562909.
Повний текст джерелаGe, Xuefeng. "Research on the Application of Adaptive Genetic Algorithm in Software Unit Security Test Simulation." Journal of Physics: Conference Series 2066, no. 1 (November 1, 2021): 012010. http://dx.doi.org/10.1088/1742-6596/2066/1/012010.
Повний текст джерелаWang, Pin. "Safety Testing Method Analysis of Computer Software." Applied Mechanics and Materials 299 (February 2013): 135–38. http://dx.doi.org/10.4028/www.scientific.net/amm.299.135.
Повний текст джерелаYang, Yong Xian, Jie Tu, Yao Jun Liu, and Chun Xiang Liu. "Application of Encryption Lock in the Power Simulation Training Software Information Protection." Applied Mechanics and Materials 457-458 (October 2013): 1152–55. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.1152.
Повний текст джерелаPing, Pan, Zhu Xuan, and Mao Xinyue. "Research on Security Test for Application Software Based on SPN." Procedia Engineering 174 (2017): 1140–47. http://dx.doi.org/10.1016/j.proeng.2017.01.267.
Повний текст джерелаKadam, Akshita D. "Enhancing Software Security for Salesforce Applications." International Journal for Research in Applied Science and Engineering Technology 7, no. 3 (March 31, 2019): 2176–85. http://dx.doi.org/10.22214/ijraset.2019.3401.
Повний текст джерелаTamrin, Suraya Ika, Azah Anir Norman, and Suraya Hamid. "Information systems security practices in social software applications." Aslib Journal of Information Management 69, no. 2 (March 20, 2017): 131–57. http://dx.doi.org/10.1108/ajim-08-2016-0124.
Повний текст джерелаFu, Weiyu, and Lixia Wang. "Software Security Testing through Coverage in Deep Neural Networks." Security and Communication Networks 2022 (August 31, 2022): 1–7. http://dx.doi.org/10.1155/2022/2834982.
Повний текст джерелаTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz, and Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems." Journal of Industrial Engineering and Management 11, no. 2 (April 6, 2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Повний текст джерелаPrema Sindhuri, B., and M. Kameswara Rao. "IoT security through web application firewall." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 58. http://dx.doi.org/10.14419/ijet.v7i2.7.10259.
Повний текст джерелаDanh, Nguyen Tan. "Personal Security in the Application of Online Software in the Technology Period 4.0." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 4 (April 11, 2021): 1686–89. http://dx.doi.org/10.17762/turcomat.v12i4.1425.
Повний текст джерелаKrawczyk, Henryk, Marcin Barylski, and Adam Barylski. "On Software Unit Testing for Improving Security and Performance of Distributed Applications." Key Engineering Materials 597 (December 2013): 131–36. http://dx.doi.org/10.4028/www.scientific.net/kem.597.131.
Повний текст джерелаHanny, Jonathan. "Building an Application Security Program." Information Security Journal: A Global Perspective 19, no. 6 (November 23, 2010): 336–42. http://dx.doi.org/10.1080/19393555.2010.514891.
Повний текст джерелаRamachandran, Muthu. "SEF4CPSIoT Software Engineering Framework for Cyber-Physical and IoT Systems." International Journal of Hyperconnectivity and the Internet of Things 5, no. 1 (January 2021): 1–24. http://dx.doi.org/10.4018/ijhiot.2021010101.
Повний текст джерелаKASHTANOV, Serhii F., Yury O. POLUKAROV, Oleksiy I. POLUKAROV, Liudmyla O. MITIUK, and Nataliia F. KACHYNSKA. "Specifics of modern security requirements for software of electronic machine control systems." INCAS BULLETIN 13, S (August 3, 2021): 87–97. http://dx.doi.org/10.13111/2066-8201.2021.13.s.9.
Повний текст джерелаLozano-Rizk, Jose E., Jose E. Gonzalez-Trejo, Raul Rivera-Rodriguez, Andrei Tchernykh, Salvador Villarreal-Reyes, and Alejandro Galaviz-Mosqueda. "Application-Aware Flow Forwarding Service for SDN-Based Data Centers." Electronics 11, no. 23 (November 24, 2022): 3882. http://dx.doi.org/10.3390/electronics11233882.
Повний текст джерелаVanoverberghe, Dries, and Frank Piessens. "Security enforcement aware software development." Information and Software Technology 51, no. 7 (July 2009): 1172–85. http://dx.doi.org/10.1016/j.infsof.2008.01.009.
Повний текст джерелаNagarjuna Reddy, Tella, and K. Annapurani Panaiyappan. "Intrusion Detection on Software Defined Networking." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 330. http://dx.doi.org/10.14419/ijet.v7i3.12.16052.
Повний текст джерелаŠimić, Goran, Mirjana Radovanović, Sanja Filipović, and Olga Mirković Isaeva. "Fuzzy logic approach in energy security decision-making: “ESecFuzzy” software application." Soft Computing 25, no. 16 (June 29, 2021): 10813–28. http://dx.doi.org/10.1007/s00500-021-05976-y.
Повний текст джерелаRani, Sangeeta, and Kanwalvir Singh Dhindsa. "Android application security: detecting Android malware and evaluating anti-malware software." International Journal of Internet Technology and Secured Transactions 10, no. 4 (2020): 491. http://dx.doi.org/10.1504/ijitst.2020.10028988.
Повний текст джерелаRani, Sangeeta, and Kanwalvir Singh Dhindsa. "Android application security: detecting Android malware and evaluating anti-malware software." International Journal of Internet Technology and Secured Transactions 10, no. 4 (2020): 491. http://dx.doi.org/10.1504/ijitst.2020.108142.
Повний текст джерелаMichalek, Peter. "Dissecting application security XML schemas." Information Security Technical Report 9, no. 3 (July 2004): 66–76. http://dx.doi.org/10.1016/s1363-4127(04)00033-0.
Повний текст джерела