*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 181 - 200 *of* 1*number_thousands_separator*258

181

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
Irada Rahimova ; Firangiz Qubadova ; Barayat Asker zade ; et al.
Сучасні інформаційні системи, Vol 3, Iss 4 (2019)

JavaScript security cryptographic hash funct... method of protection aga... document object model Computer software QA76.75-76.765
*Academic Journal*
182

Set-Based Models for Cryptocurrency Software
Betarte, Gustavo ; Cristiá, Maximiliano ; Luna, Carlos ; et al.

Computer Science - Softw...
*Report*
183

Secure by Design
Daniel Sawano ; Dan Bergh Johnsson ; Daniel Deogun ; et al.

Computer software--Devel...
*eBook*
184

Methodology for Specification and Verification of High-Level Requirements with MetAcsl
Robles, Virgile ; Kosmatov, Nikolai ; Prevosto, Virgile ; et al.
2021 IEEE/ACM 9th International Conference on Formal Methods in Software Engineering (FormaliSE) FORMALISE Formal Methods in Software Engineering (FormaliSE), 2021 IEEE/ACM 9th International Conference on. :54-67 May, 2021

*Conference*
185

A Comprehensive Benchmark Suite for Intel SGX
Kumar, Sandeep ; Panda, Abhisek ; Sarangi, Smruti R.

Computer Science - Crypt... Computer Science - Perfo...
*Report*
187

Security Risk Analysis of the Blockchain Application Ecosystem
Semwal, Divyanshu ; S, Sathya Priya ; Ponnaganti, Pavan Kumar ; et al.
2025 Conference on Building a Secure & Empowered Cyberspace (BuildSEC) BUILDSEC Building a Secure & Empowered Cyberspace (BuildSEC), 2025 Conference on. :108-117 Dec, 2025

*Conference*
188

A utility-based approach to security in robotics: security incentives, system models and network defense
Wachter, Jasmin ; Rass, Stefan ; Faber, Wolfgang ; et al.

Cybersecurity Security Incentives Robot Security Security Economics
*Dissertation/ Thesis*
189

Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations
Patnaik, Nikhil ; Dwyer, Andrew C. ; Hallett, Joseph ; et al.

Computer Science - Crypt... Computer Science - Softw...
*Report*
190

A framework for automatic and secure cycle stealing
Kelly, W. ; Roe, P.
Proceedings. Seventh International Conference on High Performance Computing and Grid in Asia Pacific Region, 2004. High performance computing and grid in Asia Pacific region High Performance Computing and Grid in Asia Pacific Region, 2004. Proceedings. Seventh International Conference on. :74-80 2004

*Conference*
191

The Impact of DoS Attacks onResource-constrained IoT Devices:A Study on the Mirai Attack
Tushir, Bhagyashri ; Sehgal, Hetesh ; Nair, Rohan ; et al.

Computer Science - Crypt...
*Report*
192

The Case for Adaptive Security Interventions
Rauf, Irum ; Petre, Marian ; Tun, Thein ; et al.

*Electronic Resource*
193

Linux Kernel Module Development with Rust
Chen, Shao-Fu ; Wu, Yu-Sung
2022 IEEE Conference on Dependable and Secure Computing (DSC) Dependable and Secure Computing (DSC), 2022 IEEE Conference on. :1-2 Jun, 2022

*Conference*
194

Supervising Smart Home Device Interactions: A Profile-Based Firewall Approach
De Keersmaeker, François ; Sadre, Ramin ; Pelsser, Cristel

Computer Science - Netwo... Computer Science - Crypt... C.2.3
*Report*
195

Hacking Cryptography : Write, Break, and Fix Real-world Implementations
Kamran Khan ; Bill Cox ; Kamran Khan ; et al.

Computers--Access contro... Computer networks--Secur... Cryptography Hacking
*eBook*
196

The Case for Adaptive Security Interventions
Rauf, Irum ; Petre, Marian ; Tun, Thein ; et al.

*Electronic Resource*
197

Occam to Go translator
Brolos, Matilde ; Johnsen, Carl-Johannes ; Skovhede, Kenneth
2021 IEEE Concurrent Processes Architectures and Embedded Systems Virtual Conference (COPA) Concurrent Processes Architectures and Embedded Systems Virtual Conference (COPA), 2021 IEEE. :1-8 Apr, 2021

*Conference*
198

Assessing Software Privacy using the Privacy Flow-Graph
Tang, Feiyang ; Østvold, Bjarte M.

Computer Science - Crypt... Computer Science - Softw...
*Report*
199

Mastering Blockchain Programming with Solidity : Write Production-ready Smart Contracts for Ethereum Blockchain with Solidity
Jitendra Chittoda ; Jitendra Chittoda

Blockchains (Databases) Electronic commerce--Sof... Web applications--Progra...
*eBook*
200

Runtime Defense against Code Injection Attacks Using Replicated Execution
Salamat, Babak ; Jackson, Todd ; Wagner, Gregor ; et al.
IEEE Transactions on Dependable and Secure Computing IEEE Trans. Dependable and Secure Comput. Dependable and Secure Computing, IEEE Transactions on. 8(4):588-601 Aug, 2011

*Academic Journal*

*Filter*