*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 5*number_thousands_separator*469*number_thousands_separator*622

1

Fifty Years of Open Source Software Supply-Chain Security.
Cox, Russ
Communications of the ACM. Oct2025, Vol. 68 Issue 10, p88-95. 8p.

OPEN source software COMPUTER security vulner... COMPUTER software securi... KERNEL operating systems HONEYWELL International...
*Periodical*
2

Dependency Network Structure and Security Vulnerabilities in Software Supply Chains.
Yoo, Eunae ; Craighead, Christopher W. ; Samtani, Sagar
Journal of Management Information Systems. 2025, Vol. 42 Issue 4, p1149-1176. 28p.

COMPUTER security vulner... SUPPLY chains STATISTICAL correlation COMPUTER software develo... COMPUTATIONAL complexity
*Academic Journal*
3

The Application of Computer Software and Hybrid Learning Framework in Chemical and Chemical Engineering Data Processing
Han, Zong
2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT) Intelligent Communication Networks and Computational Techniques (ICICNCT), 2025 International Conference on. :1-5 Sep, 2025

*Conference*
4

The Silent Scientist: When Software Research Fails to Reach Its Audience.
Wyrich, Marvin ; Tinnes, Christof ; Baltes, Sebastian ; et al.
Communications of the ACM. Nov2025, Vol. 68 Issue 11, p24-27. 4p.

STAKEHOLDERS COMPUTER software resear... RELEVANCE RESEARCH personnel SCIENTIFIC communication ADOPTION of ideas
*Periodical*
5

Research on the Application of Embedded Real-Time Software in Computer
Qi, Yemei
2025 Asia-Europe Conference on Cybersecurity, Internet of Things and Soft Computing (CITSC) CITSC Cybersecurity, Internet of Things and Soft Computing (CITSC), 2025 Asia-Europe Conference on. :375-380 Jan, 2025

*Conference*
6

Security Vulnerability Detection Technology in Computer Software
Li, Xiaoli ; Li, Qinghao ; Xiao, Mingqian ; et al.
2024 International Seminar on Artificial Intelligence, Computer Technology and Control Engineering (ACTCE) ACTCE Artificial Intelligence, Computer Technology and Control Engineering (ACTCE), 2024 International Seminar on. :525-528 Sep, 2024

*Conference*
7

*This result is not displayed to guests*

8

Computer Software Application in Blockchain and Big Data Technology
Chen, Yuxiu ; Wen, Zhenhua
2024 5th International Conference on Information Science and Education (ICISE-IE) Information Science and Education (ICISE-IE), 2024 5th International Conference on. :656-659 Dec, 2024

*Conference*
9

A GA-BP Neural Network Based Prediction Method for Computer Software Defects
Cao, Ping ; Li, Xingai
2024 4th International Symposium on Computer Technology and Information Science (ISCTIS) Computer Technology and Information Science (ISCTIS), 2024 4th International Symposium on. :536-539 Jul, 2024

*Conference*
10

EMBEDDED SOFTWARE DEVELOPMENT FOR SAFETY-CRITICAL SYSTEMS
1\p, Hobbs, Chris, VerfasserIn, (DE-588)1122593813, (DE-627)875834019, (DE-576)481383506, aut ; 1\p, Hobbs, Chris, VerfasserIn, (DE-588)1122593813, (DE-627)875834019, (DE-576)481383506, aut
2026

*Book*
11

Computer Software Programming based on C Language
Yan, Naijian
2024 Asian Conference on Intelligent Technologies (ACOIT) Intelligent Technologies (ACOIT), 2024 Asian Conference on. :1-5 Sep, 2024

*Conference*
12

Software Design of Host Computer for Fault Auxiliary Analysis of Four Wire Circuit with Changing Operation Direction
Ling, Xiaoning ; Wu, Fang ; Duan, Rui
2025 5th International Conference on Neural Networks, Information and Communication Engineering (NNICE) Neural Networks, Information and Communication Engineering (NNICE), 2025 5th International Conference on. :1175-1179 Jan, 2025

*Conference*
13

Development of a Computer Software for Measurements of Permittivity and Electromagnetic Shielding Effectiveness
Ceylan, Nazife ; Ates, Kayhan ; Kaya, Ali Onur ; et al.
2025 8th International Electromagnetic Compatibility Conference (EMC Turkiye) Electromagnetic Compatibility Conference (EMC Turkiye), 2025 8th International. :1-4 Sep, 2025

*Conference*
14

Malicious AI Models Undermine Software Supply-Chain Security.
Sood, Aditya K. ; Zeadally, Sherali
Communications of the ACM. Jun2025, Vol. 68 Issue 6, p62-71. 10p.

ARTIFICIAL intelligence COMPUTER software CYBERTERRORISM COMPUTER security DEBUGGING
*Periodical*
15

*This result is not displayed to guests*

16

Stop Using Vulnerability Counts to Measure Software Security.
Meneely, Andy ; Keller, Brandon
Communications of the ACM. Sep2025, Vol. 68 Issue 9, p34-36. 3p.

COMPUTER security vulner... CORPORATE culture COMPUTER software securi... SOFTWARE measurement SOFTWARE architecture INTERNET security
*Periodical*
17

*This result is not displayed to guests*

18

Early Phase Software Dependability Analysis: A Neutrosophic Inference System-Based Approach.
Chatterjee, Subhashis ; Saha, Deepjyoti ; Sharma, Akhilesh ; et al.
International Journal of Reliability, Quality & Safety Engineering. Oct2025, Vol. 32 Issue 5, p1-29. 29p.

ARTIFICIAL neural networ... COMPUTER software develo... COMPUTER software qualit... COMPUTER software develo... SYSTEMS software
*Academic Journal*
19

DYNAMICS OF COMPETITION ON OPENNESS STRATEGIES AND SOFTWARE MAINTENANCE.
Mallipeddi, Rakesh R. ; Demirezen, Emre M. ; Kumar, Subodha ; et al.
MIS Quarterly. Sep2024, Vol. 48 Issue 3, p1239-1261. 23p. 1 Diagram, 7 Charts.

BUSINESS enterprises COMPUTER software OPEN source software RESOURCE allocation GAME theory INTELLECTUAL property
*Academic Journal*
20

Application of Layered Technology in Computer Software Design
Shi, Langfeng
2023 9th Annual International Conference on Network and Information Systems for Computers (ICNISC) ICNISC Network and Information Systems for Computers (ICNISC), 2023 9th Annual International Conference on. :552-557 Oct, 2023

*Conference*

*Filter*