Amanote Research

Amanote Research

    RegisterSign In

Discover open access scientific publications

Search, annotate, share and cite publications


Publications by G. Terstyanszky

Security Mechanisms for Legacy Code Applications in GT3 Environment

English

Related publications

Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis

Proceedings - International Conference on Software Engineering
Software
2007English

Enhancements to Open Source Translator FABLE for Code Porting of Legacy Applications

International Journal of Advanced Research in Computer Science and Software Engineering
2017English

Comparative Study of Security Mechanisms in Multi-Cloud Environment

International Journal of Computer Applications
2013English

Migrating Legacy Applications

2013English

Elliptic Curve Based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment

International Journal of Network Security & Its Applications
2010English

Subutai: Distributed Synchronization Primitives in NoC Interfaces for Legacy Parallel-Applications

2018English

Raman Spectroscopy for Homeland Security Applications

International Journal of Spectroscopy
2012English

COSAK: Code Security Analysis Kit

2004English

Regression Testing in Developer Environment for Absence of Code Coverage

Journal of Software Engineering and Applications
2014English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy