Search Results - "secure coding"
-
1
Integrasi Audit dan Teknik Clustering untuk Segmentasi dan Kategorisasi Aktivitas Log
Published in Jurnal Teknologi Informasi dan Ilmu Komputer (2024-02-01)Subjects: “…Secure Coding…”
Get full text
Article -
2
Analisis Burnout Programmer Terhadap Penerapan Secure Coding
Published in Jurnal Teknologi Informasi dan Ilmu Komputer (2024-08-01)Subjects: “…Secure Coding…”
Get full text
Article -
3
Developer-oriented Web Security by Integrating Secure SDLC into IDEs
Published in Sakarya University Journal of Computer and Information Sciences (2018-04-01)Subjects: “…secure coding…”
Get full text
Article -
4
Cybersecurity Challenges in Industry: Measuring the Challenge Solve Time to Inform Future Challenges
Published in Information (2020-11-01)Subjects: “…secure coding…”
Get full text
Article -
5
May the Source Be with You: On ChatGPT, Cybersecurity, and Secure Coding
Published in Information (2024-09-01)Subjects: “…secure coding…”
Get full text
Article -
6
Implementation of Generative Language Models (GLM) in Cyber Exercise Secure Coding using Prompt Engineering
Published in Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (2025-04-01)Subjects: “…secure coding…”
Get full text
Article -
7
Real-Time Operating Systems’ Compliance With MISRA-C Coding Standard: A Comprehensive Study
Published in IEEE Access (2024-01-01)Subjects: “…secure coding standards…”
Get full text
Article -
8
Cybersecurity Risks in EV Mobile Applications: A Comparative Assessment of OEM and Third-Party Solutions
Published in World Electric Vehicle Journal (2025-06-01)Subjects: “…secure coding for Android applications…”
Get full text
Article -
9
Eye tracking technologies to visualize secure coding behavior
Published in Array (2022-09-01)Subjects: “…Cybersecurity secure coding…”
Get full text
Article -
10
Key management scheme of distributed IoT devices based on blockchains
Published in IET Communications (2023-07-01)Subjects: “…network security code…”
Get full text
Article -
11
Adaptively secure attribute-based encryption for traitor tracing
Published in Tongxin xuebao (2016-01-01)Subjects: “…attribute-based encryption;traitor tracing;dual system encryption;adaptive security;collusion secure code…”
Get full text
Article -
12
Secure command transmission techniques for industrial remote control
Published in Scientific Reports (2025-05-01)Subjects: “…Secure code transmission…”
Get full text
Article -
13
Adaptively secure attribute-based encryption for traitor tracing
Published in Tongxin xuebao (2016-01-01)Subjects: “…collusion secure code…”
Get full text
Article -
14
Comparison of Quantitative Morphology of Layered and Arbitrary Patterns: Contrary to Visual Perception, Binary Arbitrary Patterns Are Layered from a Structural Point of View
Published in Applied Sciences (2021-07-01)Subjects: “…morphological security code…”
Get full text
Article
