Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,660,619 papers from all fields of science
Search
Sign In
Create Free Account
Secure coding
Securing coding is the practice of developing computer software in a way that guards against the accidental introduction of security vulnerabilities…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Broader (1)
Computer security
Defensive programming
IT risk management
Outline of computer security
Provable security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base
A. Hazeyama
,
Hikaru Miyahara
,
+4 authors
Nobukazu Yoshioka
IEEE 27th International Requirements Engineering…
2019
Corpus ID: 209459620
Owing to the widespread use of the internet, software services are being provided to millions of consumers and the importance of…
Expand
2017
2017
Demonstrating a Tool for Injection Attack Prevention in MySQL
Ibéria Medeiros
,
Miguel Beatriz
,
N. Neves
,
M. Correia
Dependable Systems and Networks
2017
Corpus ID: 7005140
Despite the significant efforts put in building more secure web applications, cases of high impact breaches continue to appear…
Expand
2017
2017
Major Web Application Threats for Data Privacy & Security - Detection, Analysis and Mitigation Strategies
Varun Deshpande
,
Mydhili K. Nair
,
Dhrumil Shah
2017
Corpus ID: 64758646
.
2017
2017
Physical Layer Authentication Analysis Based on Correlative Sequence and Channel Coding
Huawei Song
,
Liang Jin
,
Xu Wang
2017
Corpus ID: 56360824
In this paper, the physical layer authentication problem is analyzed theoretically with typical set and channel coding techniques…
Expand
Review
2014
Review
2014
A Survey on Attacks in Web Usage Mining
R. Natarajan
,
D. Sugumar
2014
Corpus ID: 54899944
As the use of internet is high nowadays, threats are taking places on the use of internet. There are several kinds of online…
Expand
2014
2014
Semantically-Secure Coding Scheme Achieving the Capacity of a Gaussian Wiretap Channel
Himanshu Tyagi
,
A. Vardy
arXiv.org
2014
Corpus ID: 134610
We extend a recently proposed wiretap coding scheme to the Gaussian wiretap channel and show that it is semantically-secure…
Expand
2013
2013
Guidelines for Discovering and Improving Application Security
Gabriel Avramescu
,
M. Bucicoiu
,
D. Rosner
,
N. Tapus
Computer Science in Cars Symposium
2013
Corpus ID: 18359373
This paper analyzes current threats in computer security for web-based applications with a SQL database. We conduct a penetration…
Expand
2009
2009
Security requirements engineering-the reluctant oxymoron
Michael N. Johnstone
2009
Corpus ID: 55851695
Security is a focus in many systems that are developed today, yet this aspect of systems development is often relegated when the…
Expand
2008
2008
Securing Java code: heuristics and an evaluation of static analysis tools
Michael S. Ware
,
C. Fox
SAW '08
2008
Corpus ID: 18729741
A secure coding standard for Java does not exist. Even if a standard did exist, it is not known how well static analysis tools…
Expand
2008
2008
Nested codes for secure transmission
Ruoheng Liu
,
H. V. Poor
,
P. Spasojevic
,
Yingbin Liang
IEEE International Symposium on Personal, Indoor…
2008
Corpus ID: 16164934
This paper investigates the problem of ensuring secure communication through error-correcting coding methods. A practical…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE