<--- Back to Details
First PageDocument Content
Computing / Cyberwarfare / Security / Computer security / Computer network security / Hacking / Software testing / Common Weakness Enumeration / Vulnerability database / Attack / Common Vulnerabilities and Exposures / Architecture tradeoff analysis method
Date: 2015-05-01 17:51:11
Computing
Cyberwarfare
Security
Computer security
Computer network security
Hacking
Software testing
Common Weakness Enumeration
Vulnerability database
Attack
Common Vulnerabilities and Exposures
Architecture tradeoff analysis method

Architectural Analysis for Security (AAFS)

Add to Reading List

Source URL: resources.sei.cmu.edu

Download Document from Source Website

File Size: 1,48 MB

Share Document on Facebook

Similar Documents

CWE COMPATIBILITY ENFORCEMENT TM AUTOMATED SOURCE CODE ANALYSIS TO ENFORCE CWE COMPATIBILITY STREAMLINE CWE COMPATIBILITY ENFORCEMENT The Common Weakness Enumeration (CWE) compatibility enforcement module reports on data

DocID: 1tqTs - View Document

Security / Cyberwarfare / Computer security / Hacking / Cross-site request forgery / Cross-site scripting / Confused deputy problem / Common Weakness Enumeration / Directory traversal attack / Vulnerability / Access control / Web framework

Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

DocID: 1rjv6 - View Document

Computing / Software testing / Software engineering / Software quality / Common Weakness Enumeration / Vulnerability / Coverity / Analysis / Fortify Software / Application security / LDRA Testbed / Static program analysis

Advanced Science and Technology Letters Vol.93 (Security, Reliability and Safety 2015), pp.5-8 http://dx.doi.orgastlA Software Weakness Analysis Technique for Secure Software

DocID: 1r6qS - View Document

Security / Cyberwarfare / Computer security / Computer network security / Hacking / Vulnerability / Risk / Common Weakness Enumeration / Vulnerability database / CVSS / National Vulnerability Database / Cross-site scripting

Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

DocID: 1quHb - View Document

Computing / Cyberwarfare / Security / Computer security / Computer network security / Hacking / Software testing / Common Weakness Enumeration / Vulnerability database / Attack / Common Vulnerabilities and Exposures / Architecture tradeoff analysis method

Architectural Analysis for Security (AAFS)

DocID: 1qpdp - View Document