SHIELDS Detecting known security vulnerabilities from within design and development tools FP 7 - ICT - 2007 215995 D 5 . 3 Final Evaluation Report

نویسندگان

  • Nahid Shahmehri
  • Ana Rosa Cavalli
  • Zoltán Hornák
  • Alessandra Bagnato
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Two complementary approaches to detecting vulnerabilities in C programs. (Deux approches complémentaires pour la détection de vulnérabilités dans les programmes C)

In general, computer software vulnerabilities are de ned as special cases where an unexpected behavior of the system leads to the degradation of security properties or the violation of security policies. These vulnerabilities can be exploited by malicious users or systems impacting the security and/or operation of the attacked system. Since the literature on vulnerabilities is not always availa...

متن کامل

Usability, Accessibility and Web Security Assessment of E-government Websites in Tanzania

In spite of the fact that e-government agency (ega) in Tanzania emphasize on the use of ICT within public institutions in Tanzania, accessibility, usability and web security vulnerabilities are still not considered by the majority of web developers. The main objective of this study is to assess the usability, accessibility and web security vulnerabilities of selected Tanzania e-government websi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010