Application security

Known as: Software Security 
Application security encompasses measures taken throughout the code's life-cycle to prevent gaps in the security policy of an application or the… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
The applications of compressive sensing (CS) in the field of information security have captured a great deal of researchers… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Application security is becoming increasingly prevalent during software and especially web application development. Consequently… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Is this relevant?
Highly Cited
2013
Highly Cited
2013
A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Resin is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Many software security solutions require accurate tracking of control/data dependencies among information objects in network… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We want to help developers and security practitioners understand common types of coding errors that lead to vulnerabilities. By… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Security-enhanced Linux incorporates a strong, flexible mandatory access control architecture into Linux. It provides a mechanism… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Making an application secure is much harder than just adding a password protected login screen. This paper contains a collection… (More)
  • table 1
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?