Treffer 21 - 40 von 31.369

21

SBOM.EXE: Countering Dynamic Code Injection based on Software Bill of Materials in Java
Sharma, Aman ; Wittlinger, Martin ; Baudry, Benoit ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Zu den Favoriten
22

PPT4J: Patch Presence Test for Java Binaries
Pan, Zhiyuan ; Hu, Xing ; Xia, Xin ; et al.

Computer Science - Softw... Computer Science - Crypt...
Report
Zu den Favoriten
23

Comprehensive Evaluation of Static Analysis Tools for Their Performance in Finding Vulnerabilities in Java Code
Midya Alqaradaghi ; Tamás Kozsik
IEEE Access, Vol 12, Pp 55824-55842 (2024)

Juliet test suite 0202 electrical engineer... Empirical evaluation Electrical engineering.... 02 engineering and techn... performance metrics
Fachzeitschrift
Zu den Favoriten
24

Bonds of Protection; Structures of Exclusion: Social Security in East Java
Nooteboom, Gerben, author
Forgotten People: Poverty, Risk and Social Security in Indonesia: The Case of the Madurese. 296:92-143

Buch
Zu den Favoriten
25

Jif: Language-based Information-flow Security in Java
Pullicino, Kyle

Computer Science - Progr... Computer Science - Crypt...
Report
Zu den Favoriten
26

Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets
Ayyagari, Ramakrishna ; Figueroa, Norilyz
8

Information Security Evidence Information Science Educ... Information Policy Compliance (Legal) Control Groups
Fachzeitschrift
Zu den Favoriten
27

Identifying Vulnerable Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries
Chen, Tianyu ; Li, Lin ; Shan, Bingjie ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Zu den Favoriten
28

Performance Evaluation of Java File Security System (JFSS)
Kahanwal, Brijender ; Singh, Dr. Tejinder Pal ; Tuteja, Dr. R. K.
Pelagia Research Library Advances in Applied Science Research, Vol. 2(6), pp. 254-260, 2011

Computer Science - Opera... Computer Science - Crypt... Computer Science - Perfo...
Report
Zu den Favoriten
29

ZTD$_{JAVA}$: Mitigating Software Supply Chain Vulnerabilities via Zero-Trust Dependencies
Amusuo, Paschal C. ; Robinson, Kyle A. ; Singla, Tanmay ; et al.

Computer Science - Crypt... Computer Science - Softw... K.6.5 D.4.6
Report
Zu den Favoriten
30

Java File Security System (JFSS)
Kahanwal, Dr. Brijender ; Dua, Kanishak ; Singh, Dr. Girish Pal
Global Journal of Computer Science and Technology, Vol. 12(10), pp. 45-48, 2012

Computer Science - Crypt...
Report
Zu den Favoriten
31

Aspects and class-based security: a survey of interactions between advice weaving and the Java 2 security model
Mira Mezini ; Andreas Sewe ; Christoph Bockisch
Proceedings of the 2nd Workshop on Virtual Machines and Intermediate Languages for emerging modularization mechanisms. :1-7

CR-D.3 IR-79905 0202 electrical engineer... EWI-17731 dynamic class loading Advice weaving
Fachzeitschrift
Zu den Favoriten
33

Dieses Ergebnis kann Gästen nicht angezeigt werden.

34

Exploring unconventional food plants used by local communities in a rural area of West Java, Indonesia: ethnobotanical assessment, use trends, and potential for improved nutrition.
Rahayu YYS ; Sujarwo W ; Irsyam ASD ; et al.
Publisher: Biomed Central Country of Publication: England NLM ID: 101245794 Publication Model: Electronic Cited Medium: Internet ISSN: 1746-4269 (Electronic) Linking ISSN: 17464269 NLM ISO Abbreviation: J Ethnobiol Ethnomed Subsets: MEDLINE

Indonesia Interviews as Topic stat... Cross-Sectional Studies Humans Female Adolescent
Fachzeitschrift
Zu den Favoriten
35

Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study
Meghanathan, Natarajan
International Journal of Network Security and its Applications (IJNSA), vol. 5, no. 1, pp. 1-16, 2013

Computer Science - Crypt... C.2.0
Report
Zu den Favoriten
36

Montsalvat: Partitioning Java Applications to Minimize the TCB in Intel SGX
Yuhala, Peterson ; Ménétrey, Jämes ; Felber, Pascal ; et al.

Cryptography and Securit...
Report
Zu den Favoriten
37

Dieses Ergebnis kann Gästen nicht angezeigt werden.

39

Evaluating and Securing Text-Based Java Code through Static Code Analysis
Yang, Jeong ; Lee, Young ; Fernandez, Amanda ; et al.
28

Computer Security Programming Languages Programming Computer Uses in Educati... Technology Uses in Educa... Error Patterns
Fachzeitschrift
Zu den Favoriten

Filter