*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 1*number_thousands_separator*748

1

Fifty Years of Open Source Software Supply-Chain Security.
Cox, Russ
Communications of the ACM. Oct2025, Vol. 68 Issue 10, p88-95. 8p.

HONEYWELL International... OPEN source software COMPUTER software securi... COMPUTER security vulner... KERNEL operating systems
*Periodical*
2

An enhanced framework for securing software using iterative 4-D base security cycle appreciative inquiry.
AL Mrayat, Omar Isam ; Ibrahim, Dyala
AIP Conference Proceedings. 2026, Vol. 3406 Issue 1, p1-6. 6p.

APPRECIATIVE inquiry COMPUTER software securi... REQUIREMENTS engineering SOFTWARE frameworks
*Conference*
3

Protecting against hidden cyber threats in a cloud-based learning environment of a university.
Madina, Bereke ; Valerii, Lakhno ; Turekulova, Dametken ; et al.
AIP Conference Proceedings. 2026, Vol. 3337 Issue 1, p1-10. 10p.

COMPUTER software securi... MALWARE prevention INTRUSION detection syst... HAZARDS INTERNET security VIRTUAL classrooms
*Conference*
4

Analysis of Security Vulnerabilities in S-100-Based Maritime Navigation Software.
Cho, Hoyeon ; Lee, Changui ; Lee, Seojeong
Sensors (14248220). Feb2026, Vol. 26 Issue 4, p1246. 29p.

COMPUTER security vulner... COMPUTER software securi... SCRIPTING languages (Com... NAVIGATION
*Academic Journal*
5

Empowering Software Engineers to Design More Secure Web Applications: Guidelines and Potential of Using LLMs as a Recommender Tool.
Groner, Raffaela ; Svensson, Klara ; Axelrod, Drake ; et al.
Journal of Software: Evolution & Process. Feb2026, Vol. 38 Issue 2, p1-23. 23p.

COMPUTER software securi... LANGUAGE models DESIGN science SOFTWARE development too... WEB development
*Academic Journal*
6

基于多维度特征融合与边语义增强的 代码漏洞检测方法.
张 帅 ; 魏 乐
Application Research of Computers / Jisuanji Yingyong Yanjiu. Feb2026, Vol. 43 Issue 2, p544-551. 8p.

COMPUTER software securi... GRAPH neural networks
*Academic Journal*
7

基于分段函数的不透明谓词.
陈沈杰 ; 王智昊 ; 吴彪
Electronic Science & Technology. 2026, Vol. 39 Issue 2, p45-53. 9p.

COMPUTER software securi... MATHEMATICAL functions SOFTWARE frameworks COMPUTATIONAL complexity
*Academic Journal*
8

A Multivocal Study on Zero-Day Attacks Integrating Best Practices Into a Security Maturity Model.
Bakri, Eman ; Mahmood, Sajjad ; Alshayeb, Mohammad ; et al.
Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ). Jan2026, Vol. 51 Issue 1, p69-103. 35p.

COMPUTER software securi... BEST practices EMPIRICAL research SECURITY systems SECURITY management INTRUSION detection syst...
*Academic Journal*
9

An Integrated Cybersecurity Framework for Software Development and Risk‐Aware Practices in the SDLC.
Al Hashimi, Hussein A.
Journal of Software: Evolution & Process. Jan2026, Vol. 38 Issue 1, p1-43. 43p.

COMPUTER software develo... COMPUTER software securi... COMPUTER security vulner... SECURITY systems RISK management in busin... SOFTWARE frameworks
*Academic Journal*
10

Stop Using Vulnerability Counts to Measure Software Security.
Meneely, Andy ; Keller, Brandon
Communications of the ACM. Sep2025, Vol. 68 Issue 9, p34-36. 3p.

COMPUTER security vulner... COMPUTER software securi... SOFTWARE measurement CORPORATE culture SOFTWARE architecture INTERNET security
*Periodical*
11

Editorial Introduction.
Zwass, Vladimir
Journal of Management Information Systems; 2025, Vol. 42 Issue 4, p983-986, 4p

RECOMMENDER systems GENERATIVE artificial in... FAKE news ETHICAL problems COMPUTER software securi... INFORMATION storage & re...
*Academic Journal*
12

Securing the Software Supply Chain with Software Bill of Materials (SBOMs): An Empirical Evaluation of Open-Source Tools in Enterprise IT Environments.
Sorocean, O. ; Portillo-Dominguez, A. Omar ; Ayala-Rivera, Vanessa
Programming & Computer Software. Dec2025, Vol. 51 Issue 8, p824-847. 24p.

SUPPLY chain management COMPUTER software securi... QUANTITATIVE research OPEN source software ORGANIZATIONAL transpare... INFORMATION technology
*Academic Journal*
13

HySELoc: a hybrid semantic-enhanced approach for interpretable vulnerability localization.
Cao, Xiansheng ; Wang, Junfeng ; Wu, Peng
Computer Journal. Dec2025, Vol. 68 Issue 12, p2059-2071. 13p.

COMPUTER software securi... COMPUTER security vulner... INTERDISCIPLINARY resear... PENETRATION testing (Com... DATA structures KNOWLEDGE representation...
*Academic Journal*
14

Code obfuscation based on deep integration.
Xiong, Xiaobing ; Sha, Zihan ; Shu, Hui ; et al.
Computer Journal. Dec2025, Vol. 68 Issue 12, p1980-1995. 16p.

COMPUTER software securi... REVERSE engineering ALGORITHMS
*Academic Journal*
15

Software Security by Design.
Kuliamin, V. V. ; Petrenko, A. K. ; Rudina, E. A.
Programming & Computer Software. Dec2025, Vol. 51 Issue 6, p429-434. 6p.

COMPUTER software securi... SOFTWARE architecture COMPUTER software develo... DESIGN failures DESIGN techniques
*Academic Journal*
16

Automatic security-flaw detection - towards a fair evaluation and comparison.
Berger, Bernhard J. ; Plump, Christina
Software & Systems Modeling. Dec2025, Vol. 24 Issue 6, p1763-1796. 34p.

COMPUTER software securi... BENCHMARKING (Management... RISK assessment NATURAL language process... SCIENTIFIC community
*Academic Journal*
17

Factors influencing the adoption of secure software engineering practices in pre-adoption and post-adoption phases.
Mihelič, Anže ; Hovelja, Tomaž ; Vrhovec, Simon
Scientific Reports. 11/28/2025, Vol. 15 Issue 1, p1-14. 14p.

COMPUTER software securi... TECHNOLOGY Acceptance Mo... GOAL (Psychology) COMPUTER software develo... ACCEPTANCE (Psychology) PLANNED behavior theory
*Academic Journal*
18

LLM-based program analysis for source codes, abstract syntax trees and webassembly instructions.
Deng, Liangjun ; Zhong, Qi ; Qiu, Yao ; et al.
Cluster Computing. Nov2025, Vol. 28 Issue 14, p1-14. 14p.

SOURCE code COMPUTER software securi... FAULT diagnosis LANGUAGE models PROGRAMMING languages ENCODING
*Academic Journal*
19

Code vulnerability detection based on augmented program dependency graph and optimized CodeBERT.
Zou, Zhengbin ; Jiang, Tao ; Wang, Yizheng ; et al.
Scientific Reports. 11/10/2025, Vol. 15 Issue 1, p1-17. 17p.

COMPUTER software securi... DEEP learning LANGUAGE models LOSS functions (Statisti... DATA analytics SIGNAL detection
*Academic Journal*
20

GTVD: a multi-level aggregation vulnerability detection method based on full-dependency program graph.
He, Haitao ; Li, Shibo ; Li, Yuxiang ; et al.
Cluster Computing. Oct2025, Vol. 28 Issue 10, p1-14. 14p.

COMPUTER software securi... GRAPH neural networks REPRESENTATIONS of graph... C++ PENETRATION testing (Com...
*Academic Journal*

*Filter*