*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 31*number_thousands_separator*339

1

Java Platform Security: a Behavioral Model for Speculative Execution Vulnerabilities
Parekh, Shikha
2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT) Intelligent Communication Networks and Computational Techniques (ICICNCT), 2025 International Conference on. :1-7 Sep, 2025

*Conference*
2

LEGACY VS MODERN SECURITY HANDLING IN JAVA: A COMPARATIVE STUDY OF OPENSAML, SPRING SECURITY, AND JWT-BASED AUTHENTICATION
null Sravan Reddy Kathi
International Journal of Applied Mathematics. 38:33-43

*Academic Journal*
3

*This result is not displayed to guests*

4

*This result is not displayed to guests*

5

Large Language Model-Guided Detection of Java Fileless Webshells via Bytecode Instrumentation
Shuhao, Liu ; Yijun, Liu ; Pei, Guo ; et al.
2025 22nd International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2025 22nd International Computer Conference on. :1-5 Dec, 2025

*Conference*
6

An Investigation into Misuse of Java Security APIs by Large Language Models
Mousavi, Zahra ; Islam, Chadni ; Moore, Kristen ; et al.

Computer Science - Crypt... Computer Science - Compu... Computer Science - Compu...
*Report*
7

An Investigation into Misuse of Java Security APIs by Large Language Models
Zahra Mousavi ; Chadni Islam ; Kristen Moore ; et al.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security. :1299-1315

FOS: Computer and inform... Computer Science - Compu... Computer Science - Crypt... Computer Science - Compu... Computers and Society (c... Cryptography and Securit...
*Academic Journal*
8

*This result is not displayed to guests*

9

*This result is not displayed to guests*

10

A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications
Elrakaiby, Yehia ; Traon, Yves Le
2013 International Conference on Availability, Reliability and Security Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. :367-374 Sep, 2013

*Conference*
11

*This result is not displayed to guests*

12

Teaching Java security to enhance cybersecurity education
Haywood, Adley ; Yu, Huiming ; Yuan, Xiaohong
2013 Proceedings of IEEE Southeastcon Southeastcon, 2013 Proceedings of IEEE. :1-6 Apr, 2013

*Conference*
13

Java Security
Harpreet Sethi ; Harpreet Sethi

Java (Computer program l... Computer security
*eBook*
14

Java Security
Scott Oaks ; Scott Oaks

Java (Computer program l... Computer security
*eBook*
15

An evaluation of Java application containers according to security requirements
Herzog, A. ; Shahmehri, N.
14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05) Enabling Technologies Infrastructure for Collaborative Enterprises Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005. 14th IEEE International Workshops on. :178-183 2005

*Conference*
16

Java security
Oaks, Scott ; Oaks, Scott

Computer security Java (Computer program l... Computer programming--Ma...
*eBook*
17

Detecting Security Patches in Java Projects Using NLP Technology
Andrea Stefanoni ; Šarūnas Girdzijauskas ; Christina Jenkins ; et al.

Natural Language Process... Security Code analysis Java Transformer LSTM
*Conference*
18

Using class decompilers to facilitate the security of Java applications!
Tam, V. ; Gupta, R.K.
Proceedings of the First International Conference on Web Information Systems Engineering Web information systems engineering Web Information Systems Engineering, 2000. Proceedings of the First International Conference on. 1:153-158 vol.1 2000

*Conference*
19

Supporting real world security models in Java
Welch, I. ; Stroud, R.
Proceedings 7th IEEE Workshop on Future Trends of Distributed Computing Systems Distributed computing systems Distributed Computing Systems, 1999. Proceedings. 7th IEEE Workshop on Future Trends of. :155-159 1999

*Conference*
20

*This result is not displayed to guests*


*Filter*