Realizing the Potential of Attack Patterns for Secure Software Development
暂无分享,去创建一个
[1] Noopur Davis,et al. in Practice: A Summary of Recent Results , 2003 .
[2] Gary McGraw,et al. Exploiting Software: How to Break Code , 2004 .
[3] Michael Howard,et al. The security development lifecycle : SDL, a process for developing demonstrably more secure software , 2006 .
[4] Joshua J. Pauli,et al. Hierarchy-Driven Approach for Attack Patterns in Software Security Education , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).
[5] Joshua J. Pauli,et al. Towards a Specification Prototype for Hierarchy-Driven Attack Patterns , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).