Amanote Research

Amanote Research

    RegisterSign In

Security Mechanisms for Legacy Code Applications in GT3 Environment

doi 10.1109/empdp.2005.38
Full Text
Open PDF
Abstract

Available in full text

Date

Unknown

Authors
G. TerstyanszkyT. DelaitreA. GoyenecheT. KissK. SajadahS.C. WinterP. Kacsuk
Publisher

IEEE


Related search

Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis

Proceedings - International Conference on Software Engineering
Software
2007English

Enhancements to Open Source Translator FABLE for Code Porting of Legacy Applications

International Journal of Advanced Research in Computer Science and Software Engineering
2017English

Comparative Study of Security Mechanisms in Multi-Cloud Environment

International Journal of Computer Applications
2013English

Migrating Legacy Applications

2013English

Elliptic Curve Based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment

International Journal of Network Security & Its Applications
2010English

Subutai: Distributed Synchronization Primitives in NoC Interfaces for Legacy Parallel-Applications

2018English

Raman Spectroscopy for Homeland Security Applications

International Journal of Spectroscopy
2012English

COSAK: Code Security Analysis Kit

2004English

Regression Testing in Developer Environment for Absence of Code Coverage

Journal of Software Engineering and Applications
2014English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy