Amanote Research

Amanote Research

    RegisterSign In

A Source Code Review Method for Discovering Security Flaws Efficiently

doi 10.2991/icectt-15.2015.79
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2015

Authors
Cheng ZhouWeiwei LiYong LiChen Wang
Publisher

Atlantis Press


Related search

Security Flaws of a Password Authentication Scheme for Hierarchical WSNs

Journal of Advances in Computer Networks
2013English

Detecting Violations of Security Requirements for Vulnerability Discovery in Source Code

IEICE Transactions on Information and Systems
Electronic EngineeringPattern RecognitionHardwareComputer VisionElectricalArchitectureArtificial IntelligenceSoftware
2016English

TAGGINGSENSE: Method Based on Sensemaking for Object-Oriented Source Code Comprehension

2015English

A Smart Source Code Editor for C

International Journal of Computer Science, Engineering and Information Technology
2014English

Formal Verification of Security Properties of Smart Card Embedded Source Code

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2005English

Efficiently Securing Systems From Code Reuse Attacks

IEEE Transactions on Computers
HardwareArchitectureMathematicsComputational TheoryTheoretical Computer ScienceSoftware
2014English

Risk Assessment Method for Insider Threats in Cyber Security: A Review

International Journal of Advanced Computer Science and Applications
Computer Science
2018English

Discovering Essential Code Elements in Informal Documentation

2013English

A New Dataset for Source Code Comment Coherence

2016English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy