Umfassende Service-Einschränkungen im Bereich Ausleihe ab 17. März!

Treffer 1 - 20 von 31.339

1

Java Platform Security: a Behavioral Model for Speculative Execution Vulnerabilities
Parekh, Shikha
2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT) Intelligent Communication Networks and Computational Techniques (ICICNCT), 2025 International Conference on. :1-7 Sep, 2025

Konferenz
Zu den Favoriten
2

LEGACY VS MODERN SECURITY HANDLING IN JAVA: A COMPARATIVE STUDY OF OPENSAML, SPRING SECURITY, AND JWT-BASED AUTHENTICATION
null Sravan Reddy Kathi
International Journal of Applied Mathematics. 38:33-43

Fachzeitschrift
Zu den Favoriten
3

Dieses Ergebnis kann Gästen nicht angezeigt werden.

4

Dieses Ergebnis kann Gästen nicht angezeigt werden.

5

Large Language Model-Guided Detection of Java Fileless Webshells via Bytecode Instrumentation
Shuhao, Liu ; Yijun, Liu ; Pei, Guo ; et al.
2025 22nd International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2025 22nd International Computer Conference on. :1-5 Dec, 2025

Konferenz
Zu den Favoriten
6

An Investigation into Misuse of Java Security APIs by Large Language Models
Mousavi, Zahra ; Islam, Chadni ; Moore, Kristen ; et al.

Computer Science - Crypt... Computer Science - Compu... Computer Science - Compu...
Report
Zu den Favoriten
7

An Investigation into Misuse of Java Security APIs by Large Language Models
Zahra Mousavi ; Chadni Islam ; Kristen Moore ; et al.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security. :1299-1315

FOS: Computer and inform... Computer Science - Compu... Computer Science - Crypt... Computer Science - Compu... Computers and Society (c... Cryptography and Securit...
Fachzeitschrift
Zu den Favoriten
8

Dieses Ergebnis kann Gästen nicht angezeigt werden.

9

Dieses Ergebnis kann Gästen nicht angezeigt werden.

10

A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications
Elrakaiby, Yehia ; Traon, Yves Le
2013 International Conference on Availability, Reliability and Security Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. :367-374 Sep, 2013

Konferenz
Zu den Favoriten
11

Dieses Ergebnis kann Gästen nicht angezeigt werden.

12

Teaching Java security to enhance cybersecurity education
Haywood, Adley ; Yu, Huiming ; Yuan, Xiaohong
2013 Proceedings of IEEE Southeastcon Southeastcon, 2013 Proceedings of IEEE. :1-6 Apr, 2013

Konferenz
Zu den Favoriten
13

Java Security
Harpreet Sethi ; Harpreet Sethi

Java (Computer program l... Computer security
E-Book
Zu den Favoriten
14

Java Security
Scott Oaks ; Scott Oaks

Java (Computer program l... Computer security
E-Book
Zu den Favoriten
15

An evaluation of Java application containers according to security requirements
Herzog, A. ; Shahmehri, N.
14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05) Enabling Technologies Infrastructure for Collaborative Enterprises Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005. 14th IEEE International Workshops on. :178-183 2005

Konferenz
Zu den Favoriten
16

Java security
Oaks, Scott ; Oaks, Scott

Computer security Java (Computer program l... Computer programming--Ma...
E-Book
Zu den Favoriten
17

Detecting Security Patches in Java Projects Using NLP Technology
Andrea Stefanoni ; Šarūnas Girdzijauskas ; Christina Jenkins ; et al.

Natural Language Process... Security Code analysis Java Transformer LSTM
Konferenz
Zu den Favoriten
18

Using class decompilers to facilitate the security of Java applications!
Tam, V. ; Gupta, R.K.
Proceedings of the First International Conference on Web Information Systems Engineering Web information systems engineering Web Information Systems Engineering, 2000. Proceedings of the First International Conference on. 1:153-158 vol.1 2000

Konferenz
Zu den Favoriten
19

Supporting real world security models in Java
Welch, I. ; Stroud, R.
Proceedings 7th IEEE Workshop on Future Trends of Distributed Computing Systems Distributed computing systems Distributed Computing Systems, 1999. Proceedings. 7th IEEE Workshop on Future Trends of. :155-159 1999

Konferenz
Zu den Favoriten
20

Dieses Ergebnis kann Gästen nicht angezeigt werden.


Filter