Treffer 81 - 100 von 14.127

82

Exploring the Security Awareness of the Python and JavaScript Open Source Communities.
Gábor Antal ; Márton Keleti ; Péter Hegedüs
MSR. :16-20

Konferenz
Zu den Favoriten
84

pyCANON: A Python library to check the level of anonymity of a dataset
Díaz, Judith Sáinz-Pardo ; García, Álvaro López

Computer Science - Crypt... Computer Science - Datab...
Report
Zu den Favoriten
85

VUDENC: Vulnerability Detection with Deep Learning on a Natural Codebase for Python
Wartschinski, Laura ; Noller, Yannic ; Vogel, Thomas ; et al.
Information and Software Technology, Volume 144, April 2022, 106809

Computer Science - Crypt... Computer Science - Machi... Computer Science - Softw...
Report
Zu den Favoriten
86

Development of application programming interface for automatic identification system data.
Supria ; Faizi, M. Nur ; Afridon, M. ; et al.
AIP Conference Proceedings; 2025, Vol. 3334 Issue 1, p1-7, 7p

PYTHON programming langu... DATA security SOFTWARE frameworks AUTOMATIC identification SHIP traffic control WEB services
Konferenz
Zu den Favoriten
87

A Method to Enhance the Security Capability of Python IDE.
Vinh Pham ; Namuk Kim ; Eunil Seo ; et al.
FDSE. :399-410

Konferenz
Zu den Favoriten
88

Share, But be Aware: Security Smells in Python Gists.
Md. Rayhanur Rahman ; Akond Rahman ; Laurie A. Williams
ICSME. :536-540

Konferenz
Zu den Favoriten
89

Threat Detection Using Anomaly Detection.
Malik, Sahil
CODE Magazine; Nov/Dec2025, Vol. 26 Issue 6, p20-25, 5p, 16 Color Photographs, 1 Graph

ANOMALY detection (Compu... ARTIFICIAL intelligence SECURITY management PYTHON programming langu... MACHINE learning INTRUSION detection syst...
Zeitschrift
Zu den Favoriten
90

CyNER: A Python Library for Cybersecurity Named Entity Recognition
Alam, Md Tanvirul ; Bhusal, Dipkamal ; Park, Youngja ; et al.

Computer Science - Crypt... Computer Science - Machi...
Report
Zu den Favoriten
91

Static Analysis of Corpus of Source Codes of Python Applications
Kapustin, D. A. ; Shvyrov, V. V. ; Shulika, T. I.
Programming and Computer Software. 49(4):302-309

Fachzeitschrift
Zu den Favoriten
92

Python Crypto Misuses in the Wild
Wickert, Anna-Katharina ; Baumgärtner, Lars ; Breitfelder, Florian ; et al.
ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2021)

Computer Science - Softw... Computer Science - Crypt... D.2.2
Report
Zu den Favoriten
93

Blindspots in Python and Java APIs Result in Vulnerable Code
Brun, Yuriy ; Lin, Tian ; Somerville, Jessie Elise ; et al.

Computer Science - Softw... Computer Science - Crypt...
Report
Zu den Favoriten
94

ІНТЕГРАЛЬНА МОДЕЛЬ БЕЗПЕКИ ІНТЕРНЕТУ РЕЧЕЙ У ПРОСТОРІ ІНТЕЛЕКТУАЛІЗАЦІЇ ОБ’ЄКТІВ ІНФРАСТРУКТУРИ. (Ukrainian)
Богданович, Дудикевич Валер& ; Василівна, Микитин Галина ; Євгенович, Мурак Тарас
Cybersecurity: Education, Science, Technique / Kiberbezpeka: Osvita, Nauka, Tekhnika; 2025, Vol. 28 Issue 4, p41-56, 16p

ELECTRONIC data processi... INTERNET security SOFTWARE development too... INTERNET of things DATA protection PYTHON programming langu...
Fachzeitschrift
Zu den Favoriten
95

10A VPN Security Log Management and Visualization System.
Onah, Fidelis I. ; Ukoha, Samuel
IUP Journal of Telecommunications; Feb2025, Vol. 17 Issue 1, p54-74, 21p

JAVA programming languag... FORENSIC sciences BUSINESS databases COMPLIANCE auditing SECURITY systems PYTHON programming langu...
Fachzeitschrift
Zu den Favoriten
97

Security-Oriented Microservices Deployment Leveraging Python Analytics and Java Frameworks.
Modadugu, Jaya Krishna ; Venkata, Ravi Teja Prabhala ; Venkata, Prabhala
International Journal of Sustainability & Innovation in Engineering (IJSIE); 2024, p373-384, 12p

INTRUSION detection syst... PYTHON programming langu... JAVA programming languag... SERVICE-oriented archite... DATA analytics SECURITY management
Fachzeitschrift
Zu den Favoriten
98

Python and Malware: Developing Stealth and Evasive Malware Without Obfuscation
Koutsokostas, Vasilios ; Patsakis, Constantinos

Computer Science - Crypt...
Report
Zu den Favoriten
100

Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems.
Abiodun, Moses Kazeem ; Imoize, Agbotiname Lucky ; Awotunde, Joseph Bamidele ; et al.
Journal of Library & Information Studies. Dec2023, Vol. 21 Issue 2, p1-26. 26p.

Cloud storage Computer systems Cloud computing security... Data security Advanced Encryption Stan... Cryptography
Fachzeitschrift
Zu den Favoriten

Filter