Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
SWAP: Mitigating XSS attacks using a reverse proxy
Wurzinger, P., Platzer, C., Ludl, C., Kirda, E., Kruegel, C.
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Get full text
Conference Proceeding
Loading…
MUTEC: Mutation-based testing of Cross Site Scripting
Shahriar, H., Zulkernine, M.
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Get full text
Conference Proceeding
Loading…
Generating formal specifications for security-critical applications - A model-driven approach
Moebius, N., Stenzel, K., Reif, W.
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Get full text
Conference Proceeding
Loading…
A hybrid analysis framework for detecting web application vulnerabilities
Monga, M., Paleari, R., Passerini, E.
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Get full text
Conference Proceeding
Loading…
Metamodel for privacy policies within SOA
Allison, D. S., El Yamany, H. F., Capretz, M.
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Get full text
Conference Proceeding
Loading…
Resolving least privilege violations in software architectures
Buyens, K., De Win, B., Joosen, W.
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Get full text
Conference Proceeding
Loading…
Reusable security use cases for mobile grid environments
Rosado, D. G., Fernandez-Medina, E., Lopez, J.
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Get full text
Conference Proceeding
Loading…
Improving perimeter security with security-oriented program transformations
Hafiz, M., Johnson, R. E.
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Get full text
Conference Proceeding
Loading…
Intrusion detection using signatures extracted from execution profiles
El-Ghali, M., Masri, W.
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Get full text
Conference Proceeding
Loading…
RUP-based process model for security requirements engineering in value-added service development
Belani, H., Car, Z., Caric, A.
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Get full text
Conference Proceeding
Loading…
Welcome
Published in 2009 ICSE Workshop on Software Engineering for Secure Systems
(01.05.2009)
Get full text
Conference Proceeding
Loading…
Author index
Rosado, D. G., Fernandez-Medina, E., Lopez, J.
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Get full text
Conference Proceeding
Loading…
Release
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
(19.05.2009)
Get full text
Conference Proceeding
Loading…
USB label
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
(19.05.2009)
Get full text
Conference Proceeding
Loading…
Frequently asked questions
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
(19.05.2009)
Get full text
Conference Proceeding
Loading…
About CP
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
(19.05.2009)
Get full text
Conference Proceeding
Loading…
Title page
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
(19.05.2009)
Get full text
Conference Proceeding
Loading…
Welcome
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
(19.05.2009)
Get full text
Conference Proceeding
Loading…
The end of indexes
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
(19.05.2009)
Get full text
Conference Proceeding
Loading…
Detailed author index
Published in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
(19.05.2009)
Get full text
Conference Proceeding