Amanote Research
Register
Sign In
A Source Code Review Method for Discovering Security Flaws Efficiently
doi 10.2991/icectt-15.2015.79
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2015
Authors
Cheng Zhou
Weiwei Li
Yong Li
Chen Wang
Publisher
Atlantis Press
Related search
Security Flaws of a Password Authentication Scheme for Hierarchical WSNs
Journal of Advances in Computer Networks
Detecting Violations of Security Requirements for Vulnerability Discovery in Source Code
IEICE Transactions on Information and Systems
Electronic Engineering
Pattern Recognition
Hardware
Computer Vision
Electrical
Architecture
Artificial Intelligence
Software
TAGGINGSENSE: Method Based on Sensemaking for Object-Oriented Source Code Comprehension
A Smart Source Code Editor for C
International Journal of Computer Science, Engineering and Information Technology
Formal Verification of Security Properties of Smart Card Embedded Source Code
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Efficiently Securing Systems From Code Reuse Attacks
IEEE Transactions on Computers
Hardware
Architecture
Mathematics
Computational Theory
Theoretical Computer Science
Software
Risk Assessment Method for Insider Threats in Cyber Security: A Review
International Journal of Advanced Computer Science and Applications
Computer Science
Discovering Essential Code Elements in Informal Documentation
A New Dataset for Source Code Comment Coherence