Výsledky vyhledávání - ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms~
-
1
Autoři: a další
Přispěvatelé: a další
Zdroj: ICSE 2011 : 33rd International Conference on Software Engineering, 7th International Workshops on Software Engineering for Secure Systems (SESS 2011) ; https://hal.science/hal-01125862 ; ICSE 2011 : 33rd International Conference on Software Engineering, 7th International Workshops on Software Engineering for Secure Systems (SESS 2011), May 2011, Waikiki, Honolulu, Hawaii, United States. pp.22-28, ⟨10.1145/1988630.1988635⟩
Témata: Model Driven Approach, Information System, Security, Sécurité, Système d'information, Approche Model Driven, ACM: H.: Information Systems/H.1: MODELS AND PRINCIPLES, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO]Computer Science [cs], [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]
Geografické téma: Waikiki, Honolulu, Hawaii, United States
-
2
Autoři: a další
Zdroj: ICSE: International Conference on Software Engineering; 5/22/2021, p1248-1259, 12p
Témata: GRAPHICS processing units, COMPUTER input-output equipment, COMPUTER software development, ARTIFICIAL intelligence, SOFTWARE engineering
-
3
Autoři: a další
Přispěvatelé: a další
Zdroj: 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
IWPE'21 - 2021 International Workshop on Privacy Engineering
https://cea.hal.science/cea-03416657
IWPE'21 - 2021 International Workshop on Privacy Engineering, Sep 2021, vienne (Virtual conference), AustriaTémata: Privacy by design, GDPR, data protection, model-based, personal data detection, DFD, MDE, MBSE, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.2: Design Tools and Techniques/D.2.2.0: Computer-aided software engineering (CASE), ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.10: Design/D.2.10.0: Methodologies, ACM: I.: Computing Methodologies/I.6: SIMULATION AND MODELING, [INFO.INFO-CE]Computer Science [cs]/Computational Engineering, Finance, and Science [cs.CE]
Geografické téma: Austria
Time: vienne (Virtual conference), Austria
Relation: info:eu-repo/grantAgreement//787034/EU/Methods and tools for GDPR compliance through Privacy and Data Protection Engineering Programme: H2020-EU.3.7.6./PDP4E
-
4
Autoři: a další
Přispěvatelé: a další
Témata: Categories and Subject Descriptors, D.2.0 [Software Engineering, General—Protection mechanisms, D.3.4 [Programming Languages, Processors—Code generation, compilers, optimization General Terms, Experimentation, Measurement, Security Additional Key Words and Phrases, Time-based side channels, x86 architecture, variable latency instructions ACM Reference Format
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.306.7302; http://users.elis.ugent.be/~brdsutte/research/publications/2012TACOvancleemput.pdf
-
5
Autoři:
Zdroj: IEEE Transactions on Software Engineering; Oct97, Vol. 23 Issue 10, p616-634, 19p
-
6
Autoři:
Zdroj: Requirements Engineering; Dec2024, Vol. 29 Issue 4, p523-549, 27p
-
7
Autoři: a další
Přispěvatelé: a další
Zdroj: 1st International Conference on Runtime Verification
https://inria.hal.science/inria-00536500
1st International Conference on Runtime Verification, Howard Barringer, Klaus Havelund, Insup Lee, Nov 2010, St. Julians, Malta. pp.168-182, ⟨10.1007/978-3-642-16612-9_14⟩Témata: behavioral detection, abstraction, trace, rewriting, finite state automaton, formal language, dynamic binary instrumentation, Malware, behavior abstraction, string rewriting, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Geografické téma: St. Julians, Malta
-
8
Autoři: a další
Přispěvatelé: a další
Zdroj: https://inria.hal.science/inria-00509486 ; 2010.
Témata: malware, behavioral detection, abstraction, trace, rewriting, finite state automaton, formal language, dynamic binary instrumentation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
9
Autoři: Okunola, Abiodun
-
10
Autoři:
Zdroj: Communications of the ACM. 19:461-471
Témata: 0202 electrical engineering, electronic engineering, information engineering, General topics in the theory of software, Formal languages and automata, 02 engineering and technology, 16. Peace & justice, Algorithms in computer science
Popis souboru: application/xml
Přístupová URL adresa: https://dl.
acm .org/citation.cfm?id=360333
https://dblp.uni-trier.de/db/journals/cacm/cacm19.html#HarrisonRU76
http://portal.acm .org/citation.cfm?doid=360303.360333
https://doi.org/10.1145/360303.360333
https://dl.acm .org/doi/10.1145/360303.360333
https://doi.acm .org/10.1145/360303.360333 -
11
Autoři:
Zdroj: ACM Transactions on Information & System Security (TISSEC); 2012, Vol. 15 Issue 2, p8-8:29, 29p
-
12
Autoři: Gligor, Virgil D.
Zdroj: IEEE Transactions on Software Engineering; Nov79, Vol. 5 Issue 6, p575-586, 12p, 5 Diagrams
-
13
Autoři:
Zdroj: Communications of the ACM; Jan1973, Vol. 16 Issue 1, p15-21, 7p, 5 Diagrams
-
14
Autoři:
Zdroj: IEEE Transactions on Software Engineering; Nov82, Vol. 8 Issue 6, p574-582, 9p, 3 Diagrams, 2 Charts
-
15
Autoři:
Zdroj: Communications of the ACM; Jun2019, Vol. 62 Issue 6, p32-34, 3p
-
16
Autoři:
Zdroj: ACM Transactions on Autonomous & Adaptive Systems; 2013, Vol. 8 Issue 4, p17:1-17:41, 41p
-
17
Autoři: a další
Zdroj: ACM Transactions on Programming Languages & Systems; Mar2011, Vol. 33 Issue 2, p8-8:45, 45p
-
18
Autoři: a další
Přispěvatelé: a další
Zdroj: 5th International Conference on Malicious and Unwanted Software
https://inria.hal.science/inria-00538376
5th International Conference on Malicious and Unwanted Software, Fernando C. Colón Osorio, Oct 2010, Nancy, FranceTémata: malware, packing, self-modifying code, slicing techniques, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
-
19
Autoři:
Zdroj: ACM Transactions on Software Engineering & Methodology; Sep2024, Vol. 33 Issue 7, p1-54, 54p
-
20
Autoři: a další
Přispěvatelé: a další
Zdroj: ACM/IEEE 32nd International Conf. on Software Engineering (ICSE 2010) ; https://inria.hal.science/inria-00472287 ; ACM/IEEE 32nd International Conf. on Software Engineering (ICSE 2010), ACM/IEEE, May 2010, Cape Town, South Africa. pp.135--144, ⟨10.1145/1806799.1806823⟩ ; http://doi.acm.org/10.1145/1806799.1806823
Témata: Liability, Contract, Formal Methods, Specication, Defects, Legal Aspects, Evidence, ACM: K.: Computing Milieux/K.5: LEGAL ASPECTS OF COMPUTING, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.1: Requirements/Specifications, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification, [INFO.INFO-GL]Computer Science [cs]/General Literature [cs.GL], [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL], [INFO.INFO-IA]Computer Science [cs]/Computer Aided Engineering
Geografické téma: Cape Town, South Africa
Time: Cape Town, South Africa
Nájsť tento článok vo Web of Science
Full Text Finder