Treffer 161 - 180 von 3.449

161

Secure Code Generation at Scale with Reflexion
Datta, Arup ; Aljohani, Ahmed ; Do, Hyunsook

Cryptography and Securit... Artificial Intelligence Computational Engineerin... Software Engineering
Report
Zu den Favoriten
162
163

SecureCode v2.0: A Production-Grade Dataset for Training Security-Aware Code Generation Models
Thornton, Scott

Cryptography and Securit... Artificial Intelligence Computation and Language Machine Learning
Report
Zu den Favoriten
164

VulnLLM-R: Specialized Reasoning LLM with Agent Scaffold for Vulnerability Detection
Nie, Yuzhou ; Li, Hongwei ; Guo, Chengquan ; et al.

Cryptography and Securit... Artificial Intelligence
Report
Zu den Favoriten
166

Security Uniform Office Format Specification and API Design Based on the Java Platform
Chengxia Liu ; Ying Cai ; Ning Li
Lecture Notes in Computer Science ISBN: 9783642340611

Buch
Zu den Favoriten
167

Comparison of performance of Web services, WS-Security, RMI, and RMI–SSL
Juric, Matjaz B. ; Rozman, Ivan ; Brumen, Bostjan ; et al.
In The Journal of Systems & Software 2006 79(5):689-700

Fachzeitschrift
Zu den Favoriten
168

A Comprehensive Study on the Impact of Vulnerable Dependencies on Open-Source Software
Kumar, Shree Hari Bittugondanahalli Indra ; Sampaio, Lilia Rodrigues ; Martin, André ; et al.
2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE)

Software Engineering Cryptography and Securit...
Report
Zu den Favoriten
169

QLCoder: A Query Synthesizer For Static Analysis of Security Vulnerabilities
Wang, Claire ; Li, Ziyang ; Dutta, Saikat ; et al.

Cryptography and Securit... Programming Languages Software Engineering
Report
Zu den Favoriten
170

SCiJP: Solving Computing Issues by Java Design Pattern
Hanu Gautam ; Riya Bhatia ; Rahul Johari
Advances in Intelligent Systems and Computing ISBN: 9789811503238

Buch
Zu den Favoriten
171

TREBLE: Fast Software Updates by Creating an Equilibrium in an Active Software Ecosystem of Globally Distributed Stakeholders
Yim, Keun Soo ; Malchev, Iliyan ; Hsieh, Andrew ; et al.

Computer Science - Softw... Computer Science - Crypt...
Report
Zu den Favoriten
172

Online Voting System Based on Image Steganography and Visual Cryptography
Biju Issac ; Manas Kumar Haldar ; Lauretha Rura
Journal of Computing and Information Technology, Vol 25, Iss 1, Pp 47-61 (2017)

Electronic computers. Co... QA75.5-76.95
Fachzeitschrift
Zu den Favoriten
173

Java Cryptography & X.509 Authentication.
Sucurovic, Snezana ; Jovanovic, Zoran
Dr. Dobb's Journal: Software Tools for the Professional Programmer. Feb2005, Vol. 30 Issue 2, p40-42. 3p. 3 Color Photographs, 1 Diagram.

APPLICATION software COMPUTER software JAVA programming languag... COMPUTER architecture ALGORITHMS COMPUTER passwords
Zeitschrift
Zu den Favoriten
174

Towards a Blockchain-Based CI/CD Framework to Enhance Security in Cloud Environments
Saleh, Sabbir M ; Madhavji, Nazim ; Steinbacher, John

Cryptography and Securit... Distributed, Parallel, a...
Report
Zu den Favoriten
175

Bridging Semantics & Structure for Software Vulnerability Detection using Hybrid Network Models
Gajjar, Jugal ; Ranaware, Kaustik ; Subramaniakuppusamy, Kamalasankari

Software Engineering Artificial Intelligence Cryptography and Securit...
Report
Zu den Favoriten
176

Anonymous Client Authentication for Transport Layer Security
Dietrich, Kurt ; Institute of Applied Information Processing and Communications [Graz] (IAIK) ; Graz University of Technology [Graz] (TU Graz) ; et al.
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS). :268-280

Linz, Austria Transport Layer Security Trusted Computing TLS Direct Anonymous Attesta... Java
Konferenz
Zu den Favoriten
177

Agentic Specification Generator for Move Programs
Fu, Yu-Fu ; Xu, Meng ; Kim, Taesoo

Software Engineering Artificial Intelligence Cryptography and Securit... Programming Languages
Report
Zu den Favoriten
178

Java cryptography
Knudsen, Jonathan

Computing and Computers
Zu den Favoriten
179

ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System
Kim, Taesoo ; Han, HyungSeok ; Park, Soyeon ; et al.

Cryptography and Securit... Artificial Intelligence
Report
Zu den Favoriten
180

Java Cryptography & Attribute Certificate Management.
Sucurovic, Snezana ; Jovanovic, Zoran
Dr. Dobb's Journal: The World of Software Development. Oct2006, Vol. 31 Issue 10, p28-34. 6p. 5 Color Photographs, 2 Charts.

TELECOMMUNICATIONS stand... COMPUTER software develo... LDAP (Computer network p... COMPUTER interfaces JAVA programming languag... COMPUTER programming
Zeitschrift
Zu den Favoriten

Filter