Cybersecurity and Software Assurance
Browse the Collection
Recent Submissions
Data-Driven Selection of Security Application Frameworks During Architectural Design Multi-Criteria Selection of Capability-Based Cybersecurity Solutions Evaluating Security Assurance Case Adaptation Fighting Against XSS Attacks. A Usability Evaluation of OWASP ESAPI Output Encoding Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN Approach Augmenting Authentication with Context-Specific Behavioral Biometrics The Tularosa Study: An Experimental Design and Implementation to Quantify the Effectiveness of Cyber Deception Introduction to the Minitrack on Cybersecurity and Software AssuranceDiscover
Subject
- 8
Cybersecurity and Software Assurance8
Software Technology1
Application Frameworks1
Behavioral Biometric, Continuous Authentication...1
covert attack reconnaissance, cyber deception, ...1
Cross Site Scripting, OWASP ESAPI, Usability, S...1
cyber attack, cyber defense, deception, experim...1
decision-making, multi-criteria, cybersecurity,...1
Security1
Self-adaptation, security control, security cer...
- next >
Date issued