Search Results - ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms
-
1
Authors: et al.
Contributors: et al.
Source: ICSE 2011 : 33rd International Conference on Software Engineering, 7th International Workshops on Software Engineering for Secure Systems (SESS 2011) ; https://hal.science/hal-01125862 ; ICSE 2011 : 33rd International Conference on Software Engineering, 7th International Workshops on Software Engineering for Secure Systems (SESS 2011), May 2011, Waikiki, Honolulu, Hawaii, United States. pp.22-28, ⟨10.1145/1988630.1988635⟩
Subject Terms: Model Driven Approach, Information System, Security, Sécurité, Système d'information, Approche Model Driven, ACM: H.: Information Systems/H.1: MODELS AND PRINCIPLES, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO]Computer Science [cs], [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]
Subject Geographic: Waikiki, Honolulu, Hawaii, United States
-
2
Authors: et al.
Source: ICSE: International Conference on Software Engineering; 5/22/2021, p1248-1259, 12p
Subject Terms: GRAPHICS processing units, COMPUTER input-output equipment, COMPUTER software development, ARTIFICIAL intelligence, SOFTWARE engineering
-
3
Authors: et al.
Contributors: et al.
Source: 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
IWPE'21 - 2021 International Workshop on Privacy Engineering
https://cea.hal.science/cea-03416657
IWPE'21 - 2021 International Workshop on Privacy Engineering, Sep 2021, vienne (Virtual conference), AustriaSubject Terms: Privacy by design, GDPR, data protection, model-based, personal data detection, DFD, MDE, MBSE, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.2: Design Tools and Techniques/D.2.2.0: Computer-aided software engineering (CASE), ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.10: Design/D.2.10.0: Methodologies, ACM: I.: Computing Methodologies/I.6: SIMULATION AND MODELING, [INFO.INFO-CE]Computer Science [cs]/Computational Engineering, Finance, and Science [cs.CE]
Subject Geographic: Austria
Time: vienne (Virtual conference), Austria
Relation: info:eu-repo/grantAgreement//787034/EU/Methods and tools for GDPR compliance through Privacy and Data Protection Engineering Programme: H2020-EU.3.7.6./PDP4E
-
4
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors, D.2.0 [Software Engineering, General—Protection mechanisms, D.3.4 [Programming Languages, Processors—Code generation, compilers, optimization General Terms, Experimentation, Measurement, Security Additional Key Words and Phrases, Time-based side channels, x86 architecture, variable latency instructions ACM Reference Format
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.306.7302; http://users.elis.ugent.be/~brdsutte/research/publications/2012TACOvancleemput.pdf
-
5
Authors:
Source: IEEE Transactions on Software Engineering; Oct97, Vol. 23 Issue 10, p616-634, 19p
-
6
Authors:
Source: Requirements Engineering; Dec2024, Vol. 29 Issue 4, p523-549, 27p
-
7
Authors: et al.
Contributors: et al.
Source: 1st International Conference on Runtime Verification
https://inria.hal.science/inria-00536500
1st International Conference on Runtime Verification, Howard Barringer, Klaus Havelund, Insup Lee, Nov 2010, St. Julians, Malta. pp.168-182, ⟨10.1007/978-3-642-16612-9_14⟩Subject Terms: behavioral detection, abstraction, trace, rewriting, finite state automaton, formal language, dynamic binary instrumentation, Malware, behavior abstraction, string rewriting, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Subject Geographic: St. Julians, Malta
-
8
Authors: et al.
Contributors: et al.
Source: https://inria.hal.science/inria-00509486 ; 2010.
Subject Terms: malware, behavioral detection, abstraction, trace, rewriting, finite state automaton, formal language, dynamic binary instrumentation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
9
Authors: Okunola, Abiodun
-
10
Authors:
Source: Communications of the ACM. 19:461-471
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, General topics in the theory of software, Formal languages and automata, 02 engineering and technology, 16. Peace & justice, Algorithms in computer science
File Description: application/xml
Access URL: https://dl.
acm .org/citation.cfm?id=360333
https://dblp.uni-trier.de/db/journals/cacm/cacm19.html#HarrisonRU76
http://portal.acm .org/citation.cfm?doid=360303.360333
https://doi.org/10.1145/360303.360333
https://dl.acm .org/doi/10.1145/360303.360333
https://doi.acm .org/10.1145/360303.360333 -
11
Authors:
Source: ACM Transactions on Information & System Security (TISSEC); 2012, Vol. 15 Issue 2, p8-8:29, 29p
-
12
Authors: Gligor, Virgil D.
Source: IEEE Transactions on Software Engineering; Nov79, Vol. 5 Issue 6, p575-586, 12p, 5 Diagrams
-
13
Authors:
Source: Communications of the ACM; Jan1973, Vol. 16 Issue 1, p15-21, 7p, 5 Diagrams
Subject Terms: PROGRAMMING languages, COMPUTER programming, DATA protection, COMPUTER software, COMPUTER science, ALGORITHMS
-
14
Authors:
Source: IEEE Transactions on Software Engineering; Nov82, Vol. 8 Issue 6, p574-582, 9p, 3 Diagrams, 2 Charts
Subject Terms: DATABASES, STATISTICS, COMPUTER systems, ELECTRONIC systems, COMPUTER software, SOFTWARE engineering
-
15
Authors:
Source: Communications of the ACM; Jun2019, Vol. 62 Issue 6, p32-34, 3p
-
16
Authors:
Source: ACM Transactions on Autonomous & Adaptive Systems; 2013, Vol. 8 Issue 4, p17:1-17:41, 41p
-
17
Authors: et al.
Source: ACM Transactions on Programming Languages & Systems; Mar2011, Vol. 33 Issue 2, p8-8:45, 45p
-
18
Authors: et al.
Contributors: et al.
Source: 5th International Conference on Malicious and Unwanted Software
https://inria.hal.science/inria-00538376
5th International Conference on Malicious and Unwanted Software, Fernando C. Colón Osorio, Oct 2010, Nancy, FranceSubject Terms: malware, packing, self-modifying code, slicing techniques, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
-
19
Authors:
Source: ACM Transactions on Software Engineering & Methodology; Sep2024, Vol. 33 Issue 7, p1-54, 54p
-
20
Authors: et al.
Contributors: et al.
Source: ACM/IEEE 32nd International Conf. on Software Engineering (ICSE 2010) ; https://inria.hal.science/inria-00472287 ; ACM/IEEE 32nd International Conf. on Software Engineering (ICSE 2010), ACM/IEEE, May 2010, Cape Town, South Africa. pp.135--144, ⟨10.1145/1806799.1806823⟩ ; http://doi.acm.org/10.1145/1806799.1806823
Subject Terms: Liability, Contract, Formal Methods, Specication, Defects, Legal Aspects, Evidence, ACM: K.: Computing Milieux/K.5: LEGAL ASPECTS OF COMPUTING, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.1: Requirements/Specifications, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification, [INFO.INFO-GL]Computer Science [cs]/General Literature [cs.GL], [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL], [INFO.INFO-IA]Computer Science [cs]/Computer Aided Engineering
Subject Geographic: Cape Town, South Africa
Time: Cape Town, South Africa
Nájsť tento článok vo Web of Science
Full Text Finder