Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by G. Terstyanszky
Security Mechanisms for Legacy Code Applications in GT3 Environment
Related publications
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis
Proceedings - International Conference on Software Engineering
Software
Enhancements to Open Source Translator FABLE for Code Porting of Legacy Applications
International Journal of Advanced Research in Computer Science and Software Engineering
Comparative Study of Security Mechanisms in Multi-Cloud Environment
International Journal of Computer Applications
Migrating Legacy Applications
Elliptic Curve Based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment
International Journal of Network Security & Its Applications
Subutai: Distributed Synchronization Primitives in NoC Interfaces for Legacy Parallel-Applications
Raman Spectroscopy for Homeland Security Applications
International Journal of Spectroscopy
COSAK: Code Security Analysis Kit
Regression Testing in Developer Environment for Absence of Code Coverage
Journal of Software Engineering and Applications