Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,007,115 papers from all fields of science
Search
Sign In
Create Free Account
Security engineering
Known as:
Seo
, Default permit
, Security Engineering Officer
Expand
Security engineering is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Access control
Authentication
Certified Information Systems Security Professional
Cloud computing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
AppCracker: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps *
Fangda Cai
,
Hao Chen
,
Yuanyi Wu
,
Yuan Zhang
2014
Corpus ID: 14030841
A fundamental security principle in developing networked applications is end-to-end security, where the confidentiality and…
Expand
2012
2012
SMT Solvers in Software Security
Julien Vanegue
,
S. Heelan
Workshop on Offensive Technologies
2012
Corpus ID: 7564365
Computational capacity of modern hardware and algorithmic advances have allowed SAT solving to become a tractable technique to…
Expand
2010
2010
Security Engineering Approach to Support Software Security
F. Nunes
,
A. D. Belchior
,
A. Albuquerque
World Congress on Services
2010
Corpus ID: 13642813
As information security and privacy become increasingly important to organizations, the demand grows for software development…
Expand
2010
2010
An Access Control Model Based Testing Approach for Smart Card Applications: Results of the POSÉ Project
P. Masson
,
Marie-Laure Potet
,
+9 authors
Amal Haddad
Annual Meeting of the IEEE Industry Applications…
2010
Corpus ID: 15123062
This paper is about generating security tests from the Common Criteria expression of a security policy, in addition to functional…
Expand
Review
2009
Review
2009
Data Hiding in Audio Signal: A Review
Poulami Dutta
,
D. Bhattacharyya
,
Tai-hoon Kim
2009
Corpus ID: 215711
Information hiding technique is a new kind of secret communication technology. The majority of today’s information hiding systems…
Expand
Review
2008
Review
2008
The Intimate Supply Chain: Leveraging the Supply Chain to Manage the Customer Experience
D. Ross
2008
Corpus ID: 166280757
The Revolution in Customer Management: Becoming Intimate with Today's Customer What's Going on with Today's Customer? Dimensions…
Expand
2008
2008
Automatic Milled Rice Quality Analysis
Oliver C. Agustin
,
Byung-Joo Oh
Second International Conference on Future…
2008
Corpus ID: 11885695
This paper proposes an automatic quality evaluation framework for milled rice kernels. Shape descriptors determine the quantity…
Expand
2005
2005
Closing-the-loop: discovery and search in security visualizations
Kiran Lakkaraju
,
Ratna Bearavolu
,
A. Slagell
,
W. Yurcik
Proceedings from the Sixth Annual IEEE SMC…
2005
Corpus ID: 9372232
The tasks of security engineers include detecting attacks and responding to them. In order to accomplish this, a security…
Expand
1997
1997
Firewall placement in a large network topology
Robert N. Smith
,
S. Bhattacharya
Proceedings of the Sixth IEEE Computer Society…
1997
Corpus ID: 33366603
Network security is an integral component of a multi-user distributed information environment. Firewall (FW) technology is a…
Expand
1994
1994
System-of-systems security engineering
D. Bodeau
Tenth Annual Computer Security Applications…
1994
Corpus ID: 12844353
There is an increasing trend to treat a collection of individual systems that support a common mission as a single entity and to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE