![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 32 matches
- 2018
- Hang Hu, Peng Peng, Gang Wang:
Towards Understanding the Adoption of Anti-Spoofing Protocols in Email Systems. SecDev 2018: 94-101 - Andrea Arbelaez, Sallie Edwards, Kevin Littlefield, Sue Wang, Kangmin Zheng:
Securing Wireless Infusion Pumps. SecDev 2018: 141 - Alexander van Den Berghe, Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
A Lingua Franca for Security by Design. SecDev 2018: 69-76 - Allan Blanchard, Nikolai Kosmatov, Frédéric Loulergue
:
Tutorial: Secure Your Things: Secure Development of IoT Software with Frama-C. SecDev 2018: 126-127 - Chengjun Cai
, Huayi Duan
, Cong Wang:
Tutorial: Building Secure and Trustworthy Blockchain Applications. SecDev 2018: 120-121 - Danny Dhillon, Vishal Mishra:
Applied Threat Driven Security Verification. SecDev 2018: 135 - Mike Dodds, Stephen Magill, Aaron Tomb:
Tutorial: Continuous Verification of Critical Software. SecDev 2018: 128-129 - Archibald Samuel Elliott, Andrew Ruef, Michael Hicks, David Tarditi:
Checked C: Making C Safe by Extension. SecDev 2018: 53-60 - Darius Foo, Ming Yi Ang, Jason Yeo, Asankhaya Sharma:
SGL: A Domain-Specific Language for Large-Scale Analysis of Open-Source Code. SecDev 2018: 61-68 - François Gauthier, Nathan Keynes, Nicholas Allen, Diane Corney, Padmanabhan Krishnan:
Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions. SecDev 2018: 134 - Ronald Gil, Hamed Okhravi, Howard E. Shrobe:
There's a Hole in the Bottom of the C: On the Effectiveness of Allocation Protection. SecDev 2018: 102-109 - Sonja Glumich, Juanita Riley, E. Paul Ratazzi
, Amanda Ozanam:
BP: Integrating Cyber Vulnerability Assessments Earlier into the Systems Development Lifecycle: A Methodology to Conduct Early-Cycle Cyber Vulnerability Assessments. SecDev 2018: 77-84 - Peter Goodman, Gustavo Grieco, Alex Groce:
Tutorial: DeepState: Bringing Vulnerability Detection Tools into the Development Cycle. SecDev 2018: 130-131 - Elisa Heymann, Barton P. Miller:
Tutorial: Secure Coding Practices, Automated Assessment Tools and the SWAMP. SecDev 2018: 124-125 - Xiaoyu Hu, Jie Zhou, Spyridoula Gravani
, John Criswell
:
Transforming Code to Drop Dead Privileges. SecDev 2018: 45-52 - Raghudeep Kannavara, Jacob Vangore, William Roberts, Marcus Lindholm, Priti Shrivastav:
Automating Threat Intelligence for SDL. SecDev 2018: 137 - Jason H. Li, Douglas Schafer, David Whelihan, Stefano Lassini, Nicholas Evancich, Kyung Joon Kwak, Michael Vai, Haley Whitman:
Designing Secure and Resilient Embedded Avionics Systems. SecDev 2018: 139 - Tim McBride, Anne Townsend, Michael Ekstrom, Lauren Lusty, Julian Sexton:
Data Integrity: Recovering from Ransomware and Other Destructive Events. SecDev 2018: 140 - J. Sukarno Mertoguno, Ryan Craven, Daniel Koller, Matthew Mickelson:
Reducing Attack Surface via Executable Transformation. SecDev 2018: 138 - Vaishnavi Mohan, Lotfi Ben Othmane, Andre Kres:
BP: Security Concerns and Best Practices for Automation of Software Deployment Processes: An Industrial Case Study. SecDev 2018: 21-28 - Fabian Monrose, Jan Werner:
Tutorial: Parry and RIPOSTE: Honing Cybersecurity Skills with Challenge-Based Exercises. SecDev 2018: 132-133 - Toby C. Murray, Paul C. van Oorschot:
BP: Formal Proofs, the Fine Print and Side Effects. SecDev 2018: 1-10 - Sazzadur Rahaman, Na Meng, Danfeng Yao
:
Tutorial: Principles and Practices of Secure Crypto Coding in Java. SecDev 2018: 122-123 - Amir Rahmati
, Earlence Fernandes, Kevin Eykholt
, Atul Prakash
:
Tyche: A Risk-Based Permission Model for Smart Homes. SecDev 2018: 29-36 - Will Snavely, William Klieber, Ryan Steele, David Svoboda, Andrew Kotov:
Detecting Leaks of Sensitive Data Due to Stale Reads. SecDev 2018: 37-44 - Xuan Tang:
Best Practice for Developing Secure and Trusted Enterprise Storage & Computing Products. SecDev 2018: 142 - Christopher Theisen, Hyunwoo Sohn, Dawson Tripp, Laurie A. Williams:
BP: Profiling Vulnerabilities on the Attack Surface. SecDev 2018: 110-119 - Altaz Valani:
Rethinking Secure DevOps Threat Modeling: The Need for a Dual Velocity Approach. SecDev 2018: 136 - Charles Weir, Lynne Blair, Ingolf Becker, M. Angela Sasse, James Noble
:
Light-Touch Interventions to Improve Software Development Security. SecDev 2018: 85-93 - Lok K. Yan, Benjamin Price, Michael Zhivich, Brian Caswell, Christopher Eagle, Michael Frantzen, Holt Sorenson, Michael Thompson, Timothy Vidas, Jason Wright, Vernon Rivet, Samuel Colt VanWinkle, Clark Wood:
BP: DECREE: A Platform for Repeatable and Reproducible Security Experiments. SecDev 2018: 11-20
skipping 2 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-23 04:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint