Search Results - Security Keywords Aspect-oriented programming
-
1
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors D.2.4 [Software Engineering, Software/Program Verification, D.3.2 [Programming Languages, Language Classifications—Constraint and logic languages, D.4.6 [Operating Systems, Security and Protection General Terms Languages, Security Keywords Aspect-oriented programming
File Description: application/pdf
-
2
Formalized aspect-oriented misuse case for specifying crosscutting security threats and mitigations.
Authors: et al.
Source: PLoS ONE; 9/12/2025, Vol. 20 Issue 9, p1-40, 40p
-
3
Authors:
Source: International Journal of Web Services Research; Jan-Mar2018, Vol. 15 Issue 1, p71-88, 18p
-
4
Authors: et al.
Source: AIP Conference Proceedings; 2024, Vol. 2816 Issue 1, p1-14, 14p
-
5
Authors: et al.
Contributors: et al.
Subject Terms: General Terms Algorithms, Performance, Security Keywords Security, web application, XSS, SQL injection, aspect oriented programming
File Description: application/pdf
-
6
Authors:
Source: Computers, Materials & Continua; 2022, Vol. 73 Issue 2, p4051-4066, 16p
Subject Terms: ALGORITHMS, SOURCE code, PROGRAMMING languages, ELECTRONIC systems, ELECTRONIC equipment
-
7
Authors:
Source: Information Security Journal: A Global Perspective; Mar2008, Vol. 17 Issue 2, p56-74, 19p, 13 Diagrams, 1 Chart
-
8
Authors:
Source: Engineering, Technology & Applied Science Research; Feb2021, Vol. 11 Issue 1, p6719-6723, 5p
Subject Terms: ADVANCED Encryption Standard, ELECTRONIC systems
-
9
Authors: et al.
Source: ACM Computing Surveys; Mar2026, Vol. 58 Issue 3, p1-39, 39p
Subject Terms: SECURITY management, INTERNET of things, COMPARATIVE studies
-
10
Authors: et al.
Source: IEOM Annual International Conference Proceedings; Mar2021, p588-598, 11p
Subject Terms: COMPUTER software development, EXTREME programming, SOFTWARE refactoring, INTERNET security, DOCUMENTATION
-
11
Authors: et al.
Source: Scientific Reports; 6/8/2024, Vol. 14 Issue 1, p1-20, 20p
-
12
Authors: et al.
Source: Empirical Software Engineering; Oct2025, Vol. 30 Issue 5, p1-61, 61p
-
13
Authors: et al.
Source: Computer Journal; Oct2009, Vol. 52 Issue 7, p824-849, 26p, 14 Diagrams, 1 Chart
-
14
Authors: et al.
Source: International Journal of Electrical & Computer Engineering (2088-8708); Jun2025, Vol. 15 Issue 3, p2911-2927, 17p
-
15
Authors:
Source: Information Security Journal: A Global Perspective; 2011, Vol. 20 Issue 4/5, p231-244, 14p
-
16
Authors: et al.
Source: UKH Journal of Science & Engineering; 2022, Vol. 6 Issue 1, p12-20, 9p
-
17
Authors: et al.
Source: Symmetry (20738994); Mar2024, Vol. 16 Issue 3, p348, 18p
Subject Terms: LIFE cycles (Biology), MODULAR design, ELECTRONIC systems, BLOCK ciphers, TEST systems, CRYPTOGRAPHY
-
18
Authors:
Source: Information Security Journal: A Global Perspective; Sep2008, Vol. 17 Issue 5/6, p278-287, 10p, 2 Charts
-
19
Authors: et al.
Source: Engineering, Technology & Applied Science Research; Oct2024, Vol. 14 Issue 5, p16772-16777, 6p
Subject Terms: BLOCK ciphers, ELECTRONIC systems, CRYPTOGRAPHY, ALGORITHMS, SIMULATION methods & models
-
20
Authors: et al.
Source: Software: Practice & Experience; Dec2024, Vol. 54 Issue 12, p2454-2480, 27p
Nájsť tento článok vo Web of Science
Full Text Finder