Search Results - "self-protecting JavaScript"
-
1
Authors:
Source: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. :47-60
-
2
Authors:
Source: 2014 Enterprise Systems Conference. :211-213
-
3
Authors:
Source: Lecture Notes in Computer Science ISBN: 9783642279362
-
4
-
5
Authors: et al.
Contributors: et al.
File Description: application/pdf
-
6
Authors: et al.
Contributors: et al.
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.187.5469; http://www.cse.chalmers.se/%7Edave/papers/SafeWrappers.pdf
-
7
Authors: Phung, Phu, 1979
Subject Terms: self-protecting JavaScript, ECMAScript 5, mashup security, sandbox, Untruste JavaScript
Access URL: https://research.chalmers.se/publication/146091
-
8
Authors: Khan, Danish Anis
Subject Terms: Programvaruteknik, Software Engineering
Availability: https://hdl.handle.net/20.500.12380/118611
-
9
Authors: et al.
Source: Cybersecurity (2523-3246); 1/4/2026, Vol. 9 Issue 1, p1-12, 12p
-
10
Authors: et al.
Source: Primer on Client-Side Web Security; 2014, p83-94, 12p
-
11
Authors: Phung, Phu, 1979
Subject Terms: security policy enforcement, JavaScript security, web-application security, vehicle software security, untrusted software
File Description: electronic
-
12
Authors: et al.
Source: Journal of Computer Security; 2020, Vol. 28 Issue 3, p375-404, 30p
Subject Terms: MOBILE apps, MOBILE operating systems, JAVASCRIPT programming language, ACCESS control
Geographic Terms: CORDOBA (Spain)
Reviews & Products: ANDROID (Operating system)
-
13
Authors: et al.
Source: Security & Communication Networks; 5/2/2019, p1-21, 21p
-
14
Authors:
Source: ACM Computing Surveys; Jul2018, Vol. 50 Issue 4, p59:1-59:34, 34p, 7 Diagrams, 3 Charts
-
15
Authors:
Source: Foundations of Security Analysis & Design VIII; 2016, p32-86, 55p
-
16
Authors:
Source: Journal of Computer Security; 2016, Vol. 24 Issue 5, p541-582, 59p
-
17
Authors:
Source: 2015 IEEE Symposium on Security & Privacy; 2015, p850-865, 16p
-
18
-
19
Authors: et al.
Source: 2013 IEEE 7th International Conference on Software Security & Reliability; 2013, p119-128, 10p
-
20
Authors: et al.
Source: MILCOM 2012 - 2012 IEEE Military Communications Conference; 1/ 1/2012, p1-6, 6p
Nájsť tento článok vo Web of Science
Full Text Finder