Umfassende Service-Einschränkungen im Bereich Ausleihe ab 17. März!

Treffer 1 - 20 von 5.484.905

1

Fifty Years of Open Source Software Supply-Chain Security.
Cox, Russ
Communications of the ACM. Oct2025, Vol. 68 Issue 10, p88-95. 8p.

OPEN source software COMPUTER security vulner... COMPUTER software securi... KERNEL operating systems HONEYWELL International...
Zeitschrift
Zu den Favoriten
2

Dependency Network Structure and Security Vulnerabilities in Software Supply Chains.
Yoo, Eunae ; Craighead, Christopher W. ; Samtani, Sagar
Journal of Management Information Systems. 2025, Vol. 42 Issue 4, p1149-1176. 28p.

COMPUTER security vulner... SUPPLY chains STATISTICAL correlation COMPUTER software develo... COMPUTATIONAL complexity
Fachzeitschrift
Zu den Favoriten
3

The Application of Computer Software and Hybrid Learning Framework in Chemical and Chemical Engineering Data Processing
Han, Zong
2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT) Intelligent Communication Networks and Computational Techniques (ICICNCT), 2025 International Conference on. :1-5 Sep, 2025

Konferenz
Zu den Favoriten
4

The Silent Scientist: When Software Research Fails to Reach Its Audience.
Wyrich, Marvin ; Tinnes, Christof ; Baltes, Sebastian ; et al.
Communications of the ACM. Nov2025, Vol. 68 Issue 11, p24-27. 4p.

STAKEHOLDERS COMPUTER software resear... RELEVANCE RESEARCH personnel SCIENTIFIC communication ADOPTION of ideas
Zeitschrift
Zu den Favoriten
5

Research on the Application of Embedded Real-Time Software in Computer
Qi, Yemei
2025 Asia-Europe Conference on Cybersecurity, Internet of Things and Soft Computing (CITSC) CITSC Cybersecurity, Internet of Things and Soft Computing (CITSC), 2025 Asia-Europe Conference on. :375-380 Jan, 2025

Konferenz
Zu den Favoriten
6

SUBLIME SECURITY, CYERA, CHAINGUARD, HORIZON3.AI.
PASTERNACK, ALEX
Fast Company. Spring2026, Issue 270, p60-64. 4p. 1 Color Photograph.

ARTIFICIAL intelligence PHISHING COMPUTER software securi... PENETRATION testing (Com...
Zeitschrift
Zu den Favoriten
7

Security Vulnerability Detection Technology in Computer Software
Li, Xiaoli ; Li, Qinghao ; Xiao, Mingqian ; et al.
2024 International Seminar on Artificial Intelligence, Computer Technology and Control Engineering (ACTCE) ACTCE Artificial Intelligence, Computer Technology and Control Engineering (ACTCE), 2024 International Seminar on. :525-528 Sep, 2024

Konferenz
Zu den Favoriten
8

Dieses Ergebnis kann Gästen nicht angezeigt werden.

9

Computer Software Application in Blockchain and Big Data Technology
Chen, Yuxiu ; Wen, Zhenhua
2024 5th International Conference on Information Science and Education (ICISE-IE) Information Science and Education (ICISE-IE), 2024 5th International Conference on. :656-659 Dec, 2024

Konferenz
Zu den Favoriten
10

A GA-BP Neural Network Based Prediction Method for Computer Software Defects
Cao, Ping ; Li, Xingai
2024 4th International Symposium on Computer Technology and Information Science (ISCTIS) Computer Technology and Information Science (ISCTIS), 2024 4th International Symposium on. :536-539 Jul, 2024

Konferenz
Zu den Favoriten
11

EMBEDDED SOFTWARE DEVELOPMENT FOR SAFETY-CRITICAL SYSTEMS
1\p, Hobbs, Chris, VerfasserIn, (DE-588)1122593813, (DE-627)875834019, (DE-576)481383506, aut ; 1\p, Hobbs, Chris, VerfasserIn, (DE-588)1122593813, (DE-627)875834019, (DE-576)481383506, aut
2026

Buch
Zu den Favoriten
12

Computer Software Programming based on C Language
Yan, Naijian
2024 Asian Conference on Intelligent Technologies (ACOIT) Intelligent Technologies (ACOIT), 2024 Asian Conference on. :1-5 Sep, 2024

Konferenz
Zu den Favoriten
13

Software Design of Host Computer for Fault Auxiliary Analysis of Four Wire Circuit with Changing Operation Direction
Ling, Xiaoning ; Wu, Fang ; Duan, Rui
2025 5th International Conference on Neural Networks, Information and Communication Engineering (NNICE) Neural Networks, Information and Communication Engineering (NNICE), 2025 5th International Conference on. :1175-1179 Jan, 2025

Konferenz
Zu den Favoriten
14

Development of a Computer Software for Measurements of Permittivity and Electromagnetic Shielding Effectiveness
Ceylan, Nazife ; Ates, Kayhan ; Kaya, Ali Onur ; et al.
2025 8th International Electromagnetic Compatibility Conference (EMC Turkiye) Electromagnetic Compatibility Conference (EMC Turkiye), 2025 8th International. :1-4 Sep, 2025

Konferenz
Zu den Favoriten
15

Malicious AI Models Undermine Software Supply-Chain Security.
Sood, Aditya K. ; Zeadally, Sherali
Communications of the ACM. Jun2025, Vol. 68 Issue 6, p62-71. 10p.

ARTIFICIAL intelligence COMPUTER software CYBERTERRORISM COMPUTER security DEBUGGING
Zeitschrift
Zu den Favoriten
16

Dieses Ergebnis kann Gästen nicht angezeigt werden.

17

Stop Using Vulnerability Counts to Measure Software Security.
Meneely, Andy ; Keller, Brandon
Communications of the ACM. Sep2025, Vol. 68 Issue 9, p34-36. 3p.

COMPUTER security vulner... CORPORATE culture COMPUTER software securi... SOFTWARE measurement SOFTWARE architecture INTERNET security
Zeitschrift
Zu den Favoriten
18

Dieses Ergebnis kann Gästen nicht angezeigt werden.

19

Early Phase Software Dependability Analysis: A Neutrosophic Inference System-Based Approach.
Chatterjee, Subhashis ; Saha, Deepjyoti ; Sharma, Akhilesh ; et al.
International Journal of Reliability, Quality & Safety Engineering. Oct2025, Vol. 32 Issue 5, p1-29. 29p.

ARTIFICIAL neural networ... COMPUTER software develo... COMPUTER software qualit... COMPUTER software develo... SYSTEMS software
Fachzeitschrift
Zu den Favoriten
20

DYNAMICS OF COMPETITION ON OPENNESS STRATEGIES AND SOFTWARE MAINTENANCE.
Mallipeddi, Rakesh R. ; Demirezen, Emre M. ; Kumar, Subodha ; et al.
MIS Quarterly. Sep2024, Vol. 48 Issue 3, p1239-1261. 23p. 1 Diagram, 7 Charts.

BUSINESS enterprises COMPUTER software OPEN source software RESOURCE allocation GAME theory INTELLECTUAL property
Fachzeitschrift
Zu den Favoriten

Filter